Privacy software

Results: 6129



#Item
361Computing / Software / Technology / Mobile phones / Smartphones / Information appliances / Cloud clients / Personal computing / Android / Mobile security / IPhone / Mobile app

Measuring User Confidence in Smartphone Security and Privacy Erika Chin∗ , Adrienne Porter Felt∗ , Vyas Sekar† , David Wagner∗ ∗ University of California, Berkeley † Intel Labs {emc,apf,daw}@cs.berkeley.edu,

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-06-21 22:59:47
362Theoretical computer science / Formal methods / Computer science / Software engineering / Logic in computer science / Dependently typed programming / Proof assistants / Proof-carrying code / Formal verification / Mathematical proof / CurryHoward correspondence / Algorithm

The Weird Machines in Proof-Carrying Code IEEE Security and Privacy LangSec Workshop 2014 Invited paper Julien Vanegue Bloomberg L.P. New York, USA.

Add to Reading List

Source URL: openwall.info

Language: English - Date: 2014-10-13 00:40:06
363Cryptography / Cross-platform software / Dark web / Secure communication / Internet privacy / Dining cryptographers problem / I2P / Clientserver model / Internet Relay Chat / Freenet / Mix network / Peer-to-peer

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-03-13 12:26:53
364Computing / Software / World Wide Web / Internet privacy / Computer access control / Hypertext Transfer Protocol / HTTP cookie / Login / Cross-site request forgery / Cookie Monster / Session / Facebook

FINAL REPORTCookie Analysis

Add to Reading List

Source URL: fbcdn-dragon-a.akamaihd.net

Language: English - Date: 2013-07-09 14:28:00
365Computing / Internet / Dark web / Cyberspace / Free software / Tor hidden services / World Wide Web / Darknet markets / Tor2web / GlobaLeaks / .onion / Darknet

Tor2web: exposing the darknet on Internet Giovanni Pellerano, E-Privacy, Florence June Who am I?

Add to Reading List

Source URL: urna.winstonsmith.org

Language: English - Date: 2013-06-14 12:25:09
366Software / Employment / Business / Computing / Social networking services / Internet privacy / Privacy / Recruitment / Facebook / Internship

What Other Materials Might Appear About Me on the Internet? If you have written any articles or opinion letters that might be published in any publication that is available online, an employer may be able to find it thro

Add to Reading List

Source URL: www.odos.illinois.edu

Language: English - Date: 2006-09-27 12:51:02
367Corporate governance / National Association of Corporate Directors / Internet privacy / Privacy / HTTP cookie / Medical privacy / Politics / Computing / Computer security

NACD’s SIMPLY SMARTER SYSTEM – PRIVACY POLICY This Privacy Policy covers the privacy practices that NACD employs when providing support, subscriptions, or software as a service (the "Services") to NACD clients throug

Add to Reading List

Source URL: mysimplysmarter.com

Language: English - Date: 2015-06-26 14:32:16
368Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-10 13:39:42
369Computing / Social media / Technology / Software / Web 2.0 / Social networking services / Twitter / Social networks / Information science / Hashtag / Privacy concerns with social networking services / Social media marketing

Online Information Ripples – A Conceptual Model for Analyzing Information Dissemination Patterns in Social media Kim Holmberg Department of Information Studies, Åbo Akademi University, Finland

Add to Reading List

Source URL: kimholmberg.fi

Language: English - Date: 2014-03-17 03:36:00
370Content-control software / Virtual communities / Internet privacy / Social networking services / Internet censorship circumvention / Internet security / Facebook / Reddit / Internet censorship / Internet Relay Chat

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2012-12-18 10:55:02
UPDATE