Privacy software

Results: 6129



#Item
311Software / File sharing networks / Computing / Globally unique identifier / Gnutella / EMule / File sharing / Peer-to-peer / Ares Galaxy / Privacy in file sharing networks

Measurement and Analysis of Child Pornography Trafficking on P2P Networks Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls Jeannie Albrecht† , Emmanuel Cecchet, Brian Neil Levine Marc Liberatore, Brian Lyn

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:08
312Software / Computing / Social networking services / Smartphones / Internet privacy / Privacy / Google Play / Facebook / Mobile app / Personal /  Inc. / Android / Privacy concerns with social networking services

Microsoft Word - Mobile App Privacy Profiles -SOUPS-camera-ready

Add to Reading List

Source URL: www.usenix.org

Language: English
313Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
314Software / Computing / Digital media / Social networking services / Facebook / Blog hosting services / Social media / Social information processing / Internet privacy / Privacy / Google+ / Recommender system

Understanding and Specifying Social Access Control Lists Mainack Mondal Yabing Liu Bimal Viswanath

Add to Reading List

Source URL: www.usenix.org

Language: English
315Aeronautics / Airship / Gases / Privacy / Employee handbook / Business / Personal life

Code of conduct. At Urban Airship, we focus on providing the best possible software and services, being a joy to do business with, and helping our customers implement great ideas.

Add to Reading List

Source URL: www.urbanairship.com

Language: English - Date: 2015-11-11 15:16:27
316Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-06-05 20:26:09
317Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-07-07 21:36:37
318Software / Free software / Computing / Dark web / Cryptographic software / Cross-platform software / I2P / Peer-to-peer computing / Privacy software / Tor / Java version history

From: Andrew Lewman, Executive Director To: The Tor Community Date: October 7, 2011 This report documents progress in September 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-10-09 14:56:27
319Microsoft / Computing / World Wide Web / Internet marketing / Hypertext Transfer Protocol / Big data / Business intelligence / Session / Outlook.com / Internet privacy / Software prototyping

Usage Analysis of a Mobile Bargain Finder Application Stephan Karpischek, Darshan Santani, and Florian Michahelles Chair of Information Management, ETH Z¨urich, Switzerland Abstract. Mobile shopping applications for sma

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-06-07 09:53:20
320Software / Social networks / Digital media / Technology / Social networking services / Recommender system / Entropy / Foursquare / Internet privacy / Mobile social network / Location-based service / Social media

Bridging the Gap Between Physical Location and Online Social Networks Justin Cranshaw Eran Toch Jason Hong Aniket Kittur Norman Sadeh School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh,

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-01-22 15:47:22
UPDATE