Sciweavers

1402 search results - page 174 / 281
» Personalized privacy preservation
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
14 years 9 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
123
Voted
TRUSTBUS
2005
Springer
15 years 6 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
102
Voted
AGENTS
2001
Springer
15 years 5 months ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
ECRIME
2007
15 years 4 months ago
Examining the impact of website take-down on phishing
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraud...
Tyler Moore, Richard Clayton
153
Voted
IFIP11
2004
141views Business» more  IFIP11 2004»
15 years 2 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze