The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, we have seen a rapid growth of social networking systems (SNSs). In most SNSs, a user can configure his privacy settings to indicate who can or cannot see his friend list. Usually, SNSs, such as LinkedIn and Google Plus, also include a feature that allows a user to query mutual friends between him and any other user he can reach using the available public search feature in SNSs. While such...
Location-Based Social Network Systems (LBSNSs) are becoming increasingly popular. In LBSNSs, users can check in at various places, connect with their friends and share their check-ins (including users' locations and timestamps) with their friends and even the public. However, most LBSNSs pay on more attention to attracting users to join and actively use their systems rather than protecting users'...
More and more websites are allowing or requiring users to input their e-mail addresses to be used either as identities or for other purposes. Although username-based identity and password problems resulting from user behaviors have been a research focus for quite some time, the serious issues related to using e-mail address as an identity and the associated online behaviors of users have not been...
After identifying the fundamental weakness of existing privacy prevention, this paper proposes a software-splitting technique in which we put the split contents on the client instead of the remote trust server. Unlike traditional static client identification techniques, this new technique would encrypt the extracted contents from the software by a key relating to the hardware characteristics, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.