-
1
-
-
70349257241
-
TwoKind authentication: Protecting private information in untrustworthy environments (extended version)
-
Technical Report TR2008-632, Dartmouth College, Aug
-
K. Bailey, A. Kapadia, L. Vongsathorn, and S. W. Smith. TwoKind authentication: Protecting private information in untrustworthy environments (extended version). Technical Report TR2008-632, Dartmouth College, Aug 2008.
-
(2008)
-
-
Bailey, K.1
Kapadia, A.2
Vongsathorn, L.3
Smith, S.W.4
-
2
-
-
36849026688
-
TwoKind authentication: Usable authenticators for untrustworthy environments (poster abstract)
-
July
-
K. Bailey, L. Vongsathorn, A. Kapadia, C. Masone, and S. W. Smith. TwoKind authentication: Usable authenticators for untrustworthy environments (poster abstract). In Symposium on Usable Privacy and Security (SOUPS 2007), pages 169-170, July 2007.
-
(2007)
Symposium on Usable Privacy and Security (SOUPS 2007)
, pp. 169-170
-
-
Bailey, K.1
Vongsathorn, L.2
Kapadia, A.3
Masone, C.4
Smith, S.W.5
-
3
-
-
22144453211
-
The MyProxy online credential repository: Research articles
-
J. Basney, M. Humphrey, and V. Welch. The MyProxy online credential repository: Research articles. Softw. Pract. Exper., 35(9):801-816, 2005.
-
(2005)
Softw. Pract. Exper
, vol.35
, Issue.9
, pp. 801-816
-
-
Basney, J.1
Humphrey, M.2
Welch, V.3
-
4
-
-
14844295011
-
Direct anonymous attestation
-
New York, NY, USA, ACM
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 132-145, New York, NY, USA, 2004. ACM.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
5
-
-
70349262805
-
-
eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/hep aec connecting.asp.
-
eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/hep aec connecting.asp.
-
-
-
-
6
-
-
46449133585
-
-
S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Towards trustworthy kiosk computing. Mobile Computing Systems and Applications, 2007. HotMobile 2007. Eighth IEEE Workshop on, pages 41-45, 8-9 March 2007.
-
S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Towards trustworthy kiosk computing. Mobile Computing Systems and Applications, 2007. HotMobile 2007. Eighth IEEE Workshop on, pages 41-45, 8-9 March 2007.
-
-
-
-
7
-
-
34250729756
-
Password management strategies for online accounts
-
New York, NY, USA, ACM
-
S. Gaw and E. W. Felten. Password management strategies for online accounts. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 44-55, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the second symposium on Usable privacy and security
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
8
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, Nov. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
9
-
-
84883290046
-
-
J. Marchesini and S. W. Smith. SHEMP: Secure Hardware Enhanced MyProxy. In PST, 2005.
-
J. Marchesini and S. W. Smith. SHEMP: Secure Hardware Enhanced MyProxy. In PST, 2005.
-
-
-
-
10
-
-
17844381888
-
Keyjacking: The surprising insecurity of client-side SSL
-
J. Marchesini, S. W. Smith, and M. Zhao. Keyjacking: the surprising insecurity of client-side SSL. Computers and Security, 24(2):109-123, 2005.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 109-123
-
-
Marchesini, J.1
Smith, S.W.2
Zhao, M.3
-
11
-
-
70349245823
-
-
RSA SecurID. http://www.rsa.com/node.aspx?id=1156.
-
-
-
-
12
-
-
19944423977
-
The protection of information in computer systems
-
July
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
14
-
-
33846301080
-
PorKI: Making user PKI safe on machines of heterogeneous trustworthiness
-
Los Alamitos, CA, USA
-
S. Sinclair and S. W. Smith. PorKI: Making user PKI safe on machines of heterogeneous trustworthiness. In 21st Annual Computer Security Applications Conference, pages 419-430, Los Alamitos, CA, USA, 2005.
-
(2005)
21st Annual Computer Security Applications Conference
, pp. 419-430
-
-
Sinclair, S.1
Smith, S.W.2
-
15
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy, 2(5):25-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|