Sciweavers

2454 search results - page 178 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CCS
2008
ACM
15 years 3 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CSCW
2012
ACM
13 years 9 months ago
Boundary regulation in social media
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
Stutzman Frederic, Hartzog Woodrow
IWSEC
2007
Springer
15 years 7 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
EGOV
2003
Springer
15 years 6 months ago
Internet NGOs: Legitimacy and Accountability
As the power and influence of nongovernmental organizations (NGOs) in international debates on social and moral matters increases, questions concerning their legitimacy and account...
Anton Vedder
CIKM
2009
Springer
14 years 11 months ago
TSA'09 workshop summary: topic-sentiment analysis
This workshop seeks to bring together researchers in both computer science and social sciences who are interested in developing and using topic-sentiment analysis methods to measu...
Bei Yu, Maojin Jiang