Sciweavers

2429 search results - page 408 / 486
» Using Aspects to Design a Secure System
Sort
View
WWW
2006
ACM
15 years 10 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
CHI
2010
ACM
15 years 4 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush
CSE
2009
IEEE
15 years 4 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
CIKM
2011
Springer
13 years 9 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...