-
1
-
-
56649119249
-
-
http://www.rsasecurity.com
-
-
-
-
2
-
-
56649108305
-
-
Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
-
Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
-
-
-
-
3
-
-
70450252840
-
Johnny Can Obfuscate: Beyond Mother's Maiden Name
-
Cheswick, W.: Johnny Can Obfuscate: Beyond Mother's Maiden Name. In: Proc. Usenix HotSec (2006)
-
(2006)
Proc. Usenix HotSec
-
-
Cheswick, W.1
-
4
-
-
56649111147
-
-
Florencio, D., Herley, C.: One-Time Password Access to Any Server Without Changing the Server. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, 5222, pp. 401-420. Springer, Heidelberg (2008)
-
Florencio, D., Herley, C.: One-Time Password Access to Any Server Without Changing the Server. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 401-420. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
56649097642
-
-
Florencio, D., Herley, C: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
-
Florencio, D., Herley, C: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
84856038557
-
Flushing as a Tragedy of the Commons
-
Lake Tahoe, CA
-
Herley, C., Florêncio, D.: Flushing as a Tragedy of the Commons. In: NSPW 2008, Lake Tahoe, CA (2008)
-
(2008)
NSPW
-
-
Herley, C.1
Florêncio, D.2
-
10
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Usenix Security (1999)
-
(1999)
Usenix Security
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
11
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM (1981)
-
(1981)
Communications of the ACM
-
-
Lamport, L.1
-
12
-
-
51249089651
-
A Virtual Password Scheme to Protect Passwords
-
Lei, M., Xiao, Y., Vrbsky, S.. Li, C.-C., Liu, L.: A Virtual Password Scheme to Protect Passwords. In: Proceedings of IEEE ICC (2008)
-
(2008)
Proceedings of IEEE
, vol.199
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.3
Li, C.-C.4
Liu, L.5
-
13
-
-
56649089971
-
-
Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: SOUPS (2007)
-
Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: SOUPS (2007)
-
-
-
-
15
-
-
3042844145
-
Photographic Authentication through Untrusted Terminals
-
Pering, T., Sundar, M., Light, J., Want, R.: Photographic Authentication through Untrusted Terminals. IEEE Security and Privacy (2003)
-
(2003)
IEEE Security and Privacy
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
17
-
-
33751057130
-
Cognitive Authentication Schemes Safe Against Spyware
-
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware. In: Symp. on Security and Privacy (2006)
-
(2006)
Symp. on Security and Privacy
-
-
Weinshall, D.1
|