The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2011 vol.9)
pp: 74-76
Landon P. Cox , Duke University
Security researchers and practitioners must strive to develop better techniques and tools to help verify the authenticity of the data on which we increasingly rely.
Wikipedia, crowdsourcing, data authentication
Landon P. Cox, "Truth in Crowdsourcing", IEEE Security & Privacy, vol.9, no. 5, pp. 74-76, September/October 2011, doi:10.1109/MSP.2011.145
1. V. Lenders et al., "Location-Based Trust for Mobile User-Generated Content: Applications, Challenges and Implementations," Proc. 9th Workshop Mobile Computing Systems and Applications (HotMobile 08), ACM Press, 2008, pp. 60–64.
2. S. Saroiu and A. Wolman, "Enabling New Mobile Applications with Location Proofs," Proc. 10th Workshop Mobile Computing Systems and Applications (HotMobile 09), ACM Press, 2009; alecwhotmobile-2009.pdf.
3. A. Dua et al., "Towards Trustworthy Participatory Sensing," Proc. 4th Workshop Hot Topics in Security (HotSec 09), Usenix Assoc., 2009; dua.pdf.
4. S. Saroiu and A. Wolman, "I Am a Sensor, and I Approve This Message," Proc. 11th Workshop Mobile Computing Systems and Applications (HotMobile 10), ACM Press, 2010, pp. 37–42.
5. P. Gilbert et al., "YouProve: Authenticity and Fidelity in Mobile Sensing," to be published in Proc. 9th ACM Conf. Embedded Networked Sensor Systems (SenSys 11), ACM Press, 2011.
6. D. Wang et al., "On Bayesian Interpretation of Fact-Finding in Information Networks," Proc. 14th Int'l Conf. Information Fusion, IEEE Press, 2009; .
12 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool