Sciweavers

2656 search results - page 83 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
CCS
2007
ACM
15 years 6 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
HUC
2011
Springer
13 years 11 months ago
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of ...
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cra...
TDHMS
2008
14 years 10 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
POPL
2005
ACM
16 years 6 days ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
JMM2
2006
113views more  JMM2 2006»
14 years 12 months ago
Personal Media Producer: A System for Creating 3D CG Animation from Mobile Phone E-mail
Mobile phone e-mail is increasingly being chosen by consumers as their primary communication tool. Messages exchanged among mobile phone users frequently contain "emoticons (s...
Koichi Emura, Makoto Yasugi, Toshiyuki Tanaka, Sei...