Sciweavers

478 search results - page 95 / 96
» Privacy and pricing personal information
Sort
View
84
Voted
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
72
Voted
USS
2008
14 years 12 months ago
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that achieves increased election integrity through the novel use of confirmation codes printed...
David Chaum, Richard Carback, Jeremy Clark, Aleksa...
101
Voted
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
91
Voted
BCSHCI
2008
14 years 11 months ago
The roles of time, place, value and relationships in collocated photo sharing with camera phones
Photo sharing on camera phones is becoming a common way to maintain closeness and relationships with friends and family. How people share their photos in collocated settings using...
Hanna Stelmaszewska, Bob Fields, Ann Blandford
SOCIALCOM
2010
14 years 7 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...