| 2590
Attacking Image Recognition Captchas - A Naive but Effective Approach |
| 2509
In Search of Search Privacy |
| 2824
Efficiency Improvement Of Homomorphic E-Auction |
| 2612
A Privacy-Preserving Architecture for the Semantic Web based on Tag
Suppression |
| 2607
Untraceability and Profiling are Not Mutually Exclusive |
| 2629
Formal Proof of Cooperativeness in a Multi-Party P2P Content
Authentication Protocol |
| 2899
Context-Aware Privacy Design Pattern Selection |
| 2920
Real-Time Remote Attestation with Privacy Protection |
| 2908
An Insider Threat Prediction Model |
| 2921
Security for Dynamic Service-oriented eCollaboration - Architectural
Alternatives & Proposed Solution |
| 2915
Privacy Policy Referencing |
| 2936
Private Searching on MapReduce |
| 2935
Assessing the Usability of End-User Security Software |
| 2939
Mechanizing Social Trust-Aware Recommenders with T-index Augmented
Trustworthiness |
| 2944
Building ISMS Through Knowledge Reuse |
| 2943
Extending XACML Access Control Architecture for Allowing
Preference-Based Authorisation |
| 2956
An Agent Based Back-end RFID Tag Management System |
| 2962
A Call Conference Room Interception Attack and Detection |
| 2969
Safe and Efficient Strategies for Updating Firewall Policies |
| 2964
The dynamic due process of information security awareness networks of
association |