Sciweavers

562 search results - page 66 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
102
Voted
CHI
2010
ACM
15 years 10 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
IUI
2012
ACM
13 years 11 months ago
Airwriting: demonstrating mobile text input by 3D-space handwriting
We demonstrate our airwriting interface for mobile handsfree text entry. The interface enables a user to input text into a computer by writing in the air like on an imaginary blac...
Christoph Amma, Tanja Schultz
CCS
2006
ACM
15 years 7 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
159
Voted
CHI
2010
ACM
15 years 10 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
CCR
2005
97views more  CCR 2005»
15 years 3 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin