Sciweavers

2454 search results - page 144 / 491
» Privacy in the Information and Communications Technologies
Sort
View
PET
2010
Springer
15 years 5 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley
AI
2003
Springer
15 years 6 months ago
Negotiating Exchanges of Private Information for Web Service Eligibility
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Keping Jia, Bruce Spencer
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
97
Voted
WWW
2010
ACM
15 years 1 months ago
Finding influentials based on the temporal order of information adoption in twitter
Twitter offers an explicit mechanism to facilitate information diffusion and has emerged as a new medium for communication. Many approaches to find influentials have been proposed...
Changhyun Lee, Haewoon Kwak, Hosung Park, Sue B. M...
JITECH
2008
172views more  JITECH 2008»
15 years 1 months ago
Information systems in developing countries: a critical research review
In this paper I review the Information Systems (IS) research on how developing countries have attempted to benefit from information and communication technologies (ICTs). First I ...
Chrisanthi Avgerou