Sciweavers

901 search results - page 145 / 181
» On Anonymization of String Data
Sort
View
ISI
2003
Springer
15 years 6 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
SACMAT
2010
ACM
15 years 6 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
PAM
2010
Springer
15 years 3 months ago
A First Look at Mobile Hand-Held Device Traffic
Abstract. Although mobile hand-held devices (MHDs) are ubiquitous today, little is know about how they are used--especially at home. In this paper, we cast a first look on mobile h...
Gregor Maier, Fabian Schneider, Anja Feldmann
USENIX
2000
15 years 2 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
COMPUTER
2004
144views more  COMPUTER 2004»
15 years 1 months ago
ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing
The UCSD ActiveCampus project is an exploration of wireless location-aware computing in the university setting. ActiveClass supports classroom activities such as anonymous asking ...
William G. Griswold, Patricia Shanahan, Steven W. ...