User Anonymity on Twitter (English)
- New search for: Peddinti, Sai Teja
- New search for: Peddinti, Sai Teja
- New search for: Ross, Keith W
- New search for: Cappos, Justin
In:
IEEE security & privacy
;
15
, 3
; 84-87
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:User Anonymity on Twitter
-
Contributors:
-
Published in:IEEE security & privacy ; 15, 3 ; 84-87
-
Publisher:
- New search for: IEEE
-
Place of publication:New York, NY
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 15, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of Contents| 2017
- 3
-
Ethics in Information Security| 2017
- 5
-
Masthead| 2017
- 6
-
Silver Bullet Talks with Kate PearceMcGraw, Gary et al. | 2017
- 10
-
New Membership Options for A Better Fit.| 2017
- 11
-
Achieve your career goals with the fit that's right for you.| 2017
- 12
-
A Vote of Confidence?Benaloh, Josh / Ryan, Peter Y.A. / Schneider, Steve / Teague, Vanessa et al. | 2017
- 14
-
An Efficient E2E Verifiable E-voting System without Setup AssumptionsKiayias, Aggelos / Zacharias, Thomas / Bingsheng Zhang, et al. | 2017
- 24
-
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?Kulyk, Oksana / Neumann, Stephan / Budurushi, Jurlind / Volkamer, Melanie et al. | 2017
- 30
-
Detecting the Detectable: Unintended Consequences of Cryptographic Election VerificationEssex, Aleksander et al. | 2017
- 39
-
Call for Papers: Special Issue on AI Ethics: The Privacy Challenge| 2017
- 40
-
Long-Term Threats to Ballot PrivacyVan De Graaf, Jeroen et al. | 2017
- 48
-
When Is an Election Verifiable?Rivest, Ronald L. / Stark, Philip B. et al. | 2017
- 51
-
Call for Nominees: Education Awards Nominations| 2017
- 52
-
Are We Really Close? Verifying Proximity in Wireless SystemsRanganathan, Aanjhan / Capkun, Srdjan et al. | 2017
- 59
-
IEEE Computer Society 2017 Call for Major Award Nominations| 2017
- 60
-
Rethinking Security in the Era of Cloud ComputingAikat, Jay / Akella, Aditya / Chase, Jeffrey S. / Juels, Ari / Reiter, Michael K. / Ristenpart, Thomas / Sekar, Vyas / Swift, Michael et al. | 2017
- 70
-
ACM CCS 2016 Interviews, Part 2Sadeghi, Ahmad-Reza / Zeitouni, Shaza et al. | 2017
- 77
-
IEEE Computer Society| 2017
- 78
-
The Market's Law of Privacy: Case Studies in Privacy and Security AdoptionGupta, Chetan et al. | 2017
- 84
-
User Anonymity on TwitterPeddinti, Sai Teja / Ross, Keith W. / Cappos, Justin et al. | 2017
- 88
-
myCS| 2017
- 89
-
IEEE Computer Society Harlan D. Mills Award| 2017
- 90
-
Cybersecurity Education and Assessment in EDURangeWeiss, Richard / Turbak, Franklyn / Mache, Jens / Locasto, Michael E. et al. | 2017
- 96
-
Jurisdiction and the InternetBellovin, Steven M. et al. | 2017
- c1
-
Front Cover| 2017
- c2
-
Call for Papers: Special Issue on Hacking without Humans| 2017
- c3
-
Focus on Your Job Search| 2017
- c4
-
IEEE Security & Privacy| 2017
-
IEEE Security & Privacy| 2017