2590
Attacking Image Recognition Captchas - A Naive but Effective Approach |
2509
In Search of Search Privacy |
2824
Efficiency Improvement Of Homomorphic E-Auction |
2612
A Privacy-Preserving Architecture for the Semantic Web based on Tag
Suppression |
2607
Untraceability and Profiling are Not Mutually Exclusive |
2629
Formal Proof of Cooperativeness in a Multi-Party P2P Content
Authentication Protocol |
2899
Context-Aware Privacy Design Pattern Selection |
2920
Real-Time Remote Attestation with Privacy Protection |
2908
An Insider Threat Prediction Model |
2921
Security for Dynamic Service-oriented eCollaboration - Architectural
Alternatives & Proposed Solution |
2915
Privacy Policy Referencing |
2936
Private Searching on MapReduce |
2935
Assessing the Usability of End-User Security Software |
2939
Mechanizing Social Trust-Aware Recommenders with T-index Augmented
Trustworthiness |
2944
Building ISMS Through Knowledge Reuse |
2943
Extending XACML Access Control Architecture for Allowing
Preference-Based Authorisation |
2956
An Agent Based Back-end RFID Tag Management System |
2962
A Call Conference Room Interception Attack and Detection |
2969
Safe and Efficient Strategies for Updating Firewall Policies |
2964
The dynamic due process of information security awareness networks of
association |