It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
How It Works TrackMeNot runs in Firefox as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and MSN. It hides users' actual search trails in a cloud of 'ghost' quer
Identity theft is the crime that keeps on giving. Years after victims' identities have been compromised they can still be managing the effects of a ruined credit history, which can cost them bank mortgages or jobs. Victims can even face jail time for crim
Stiftung Secure Information and Communication Technologies SIC offers a wide range of cryptography- and security-related Java products, covering all aspects of data and communication security.
F. Abel, J. Coi, N. Henze, A. Koesling, D. Krause, and D. Olmedilla. Proceedings of the 6th International Semantic Web Conference and 2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, volume 4825 of LNCS, page 1--14. Berlin, Heidelberg, Springer Verlag, (November 2007)
F. Abel, J. Coi, N. Henze, A. Koesling, D. Krause, and D. Olmedilla. Proceedings of the 6th International Semantic Web Conference and
2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, volume 4825 of LNCS, page 1--14. Berlin, Heidelberg, Springer Verlag, (November 2007)
M. Bilal, and S. Kang. (April 2017)cite arxiv:1705.00764Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures.
M. Bilal, and S. Kang. Sensors, (2017)cite arxiv:1705.00764Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures.
M. Brenner, H. Perl, and M. Smith. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, page 375 -382. (June 2012)
J. Camenisch, and E. Herreweghen. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, page 21-30. New York, NY, USA, ACM, (2002)