Sciweavers

1191 search results - page 191 / 239
» Online Games and Security
Sort
View
87
Voted
WPES
2004
ACM
15 years 6 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
145
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 5 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
105
Voted
IPPS
2000
IEEE
15 years 5 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
108
Voted
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
15 years 4 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
88
Voted
ICWSM
2008
15 years 2 months ago
Social Access Control for Social Media Using Shared Knowledge Questions
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our scho...
Michael Toomim, Xianhang Zhang, James Fogarty, Nat...