This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
Collaborative tagging applications have become a popular tool allowing Internet users to manage online resources with tags. Most collaborative tagging applications permit unsuperv...
Jonathan Gemmell, Maryam Ramezani, Thomas Schimole...
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
Many decision support systems, which utilize association rules for discovering interesting patterns, require the discovery of association rules that vary over time. Such rules des...
Sridhar Ramaswamy, Sameer Mahajan, Abraham Silbers...
Web sites are now considered an extension of the entire business, not just an additional channel or storefront or a simple information portal for the company. Creating an effectiv...