Sciweavers

2454 search results - page 53 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
NETGAMES
2006
ACM
15 years 3 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
CSCW
2002
ACM
14 years 9 months ago
Instant messaging in teen life
Instant Messaging (IM) is being widely adopted by teenagers. In a study of 16 teenage IM users, we explore IM as an emerging feature of teen life, focusing our questions on its su...
Rebecca E. Grinter, Leysia Palen
CIKM
2006
Springer
15 years 1 months ago
k nearest neighbor classification across multiple private databases
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
Li Xiong, Subramanyam Chitti, Ling Liu
WWW
2004
ACM
15 years 10 months ago
Next generation web technologies in content management
The development of information and communication technologies and the expansion of the Internet means that, nowadays, there are huge amounts of information available via these eme...
Jesús Villamor-Lugo, Luis Sánchez Fe...