Sciweavers

110 search results - page 5 / 22
» Secure encounter-based social networks: requirements, challe...
Sort
View
JCDL
2010
ACM
166views Education» more  JCDL 2010»
14 years 11 months ago
Timeline interactive multimedia experience (time): on location access to aggregate event information
Attending a complex scheduled social event, such as a multi-day music festival, requires a significant amount of planning before and during its progression. Advancements in mobile...
Jeff Crow, Eryn Whitworth, Ame Wongsa, Luis Franci...
TPDS
2010
142views more  TPDS 2010»
14 years 7 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
PET
2010
Springer
15 years 1 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
CHI
2011
ACM
14 years 1 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
15 years 1 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards