메뉴 건너뛰기




Volumn 309, Issue , 2009, Pages 139-148

Security and privacy preservation in human-involved networks

Author keywords

[No Author keywords available]

Indexed keywords

FACEBOOK; FORMAL SECURITY MODELS; SECURE NETWORKS; SECURE PROTOCOLS; SECURITY AND PRIVACY; SOCIAL NETWORKING;

EID: 76649104076     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05437-2_13     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 2
    • 51849153945 scopus 로고    scopus 로고
    • Beam auth: Two-factorweb authentication with a bookmark
    • Adida, B.: BeamAuth: Two-FactorWeb Authentication with a Bookmark. In: Proc. ACM CCS 2007, pp. 48-57 (2007)
    • (2007) Proc. ACM CCS 2007 , pp. 48-57
    • Adida, B.1
  • 3
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard ai problems for security
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.2656, pp. 294-311. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 294-311
    • Von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 4
    • 42149191219 scopus 로고    scopus 로고
    • Faith-based security: A tongue-in-cheek look at serious security issues
    • Berghel, H.: Faith-based Security: A Tongue-in-Cheek Look at Serious Security Issues. Communications of the ACM 51(4), 13-17 (2008)
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 13-17
    • Berghel, H.1
  • 5
    • 76649112971 scopus 로고    scopus 로고
    • Bluetooth SIG Bluetooth Core Specification v2.1 EDR (July 26, 2007)
    • Bluetooth SIG: Bluetooth Core Specification v2.1 EDR (July 26, 2007)
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 8
    • 50949100007 scopus 로고    scopus 로고
    • IACR Cryptology ePrint Archive, report 2007/399 (last revised October 17)
    • Ellison, C.: Ceremony Design and Analysis. IACR Cryptology ePrint Archive, report 2007/399 (last revised October 17, 2007)
    • (2007) Ceremony Design and Analysis
    • Ellison, C.1
  • 9
    • 70349744780 scopus 로고    scopus 로고
    • Privacy protection for social networking platforms
    • Felt, A., Evans, D.: Privacy Protection for Social Networking Platforms. In: Proc. W2SP 2008 (2008)
    • (2008) Proc. W2SP 2008
    • Felt, A.1    Evans, D.2
  • 10
    • 3042823619 scopus 로고    scopus 로고
    • Email-based identification and authentication: An alternative to PKI?
    • Garfinkel, S.L.: Email-based Identification and Authentication: an Alternative to PKI? IEEE S & P 1(6), 20-26 (2003)
    • (2003) IEEE S & P , vol.1 , Issue.6 , pp. 20-26
    • Garfinkel, S.L.1
  • 12
    • 79960851673 scopus 로고    scopus 로고
    • Conditioned-safe ceremonies and a user study of an application to web authentication
    • (to appear)
    • Karlof, C., Tygar, J.D.,Wagner, D.: Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In: Proc. NDSS 2009 (to appear, 2009)
    • (2009) Proc. NDSS 2009
    • Karlof, C.1    Tygar, J.D.2    Wagner, D.3
  • 13
    • 84957649548 scopus 로고    scopus 로고
    • Identity escrow
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 169-185. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 169-185
    • Kilian, J.1    Petrank, E.2
  • 15
    • 38549099144 scopus 로고    scopus 로고
    • On the security of a popular web submission and review software
    • Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
    • Lo, S.-W., Phan, R.C.-W., Goi, B.-M.: On the Security of a Popular Web Submission and Review Software. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.4867, pp. 245-265. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4867 , pp. 245-265
    • Lo, S.-W.1    Phan, R.C.-W.2    Goi, B.-M.3
  • 17
    • 65449137148 scopus 로고    scopus 로고
    • Personal knowledge questions for fallback authentication: Security questions in the era of facebook
    • Rabkin, A.: Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook. In: Proc. SOUPS 2008, pp. 13-23 (2008)
    • (2008) Proc. SOUPS 2008 , pp. 13-23
    • Rabkin, A.1
  • 18
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest Link': A Human- Computer interaction approach to usable and effective security
    • Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the 'Weakest Link': a Human- Computer Interaction Approach to Usable and Effective Security. BT Technology Journal 19(3), 122-131 (2001)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 19
    • 34548786769 scopus 로고    scopus 로고
    • Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: Emperor's New Security Indicators: an Evaluation of Website Authentication and the Effect of Role Playing on Usability Studies. In: Proc. IEEE S & P 2007, pp. 51-65 (2007)
    • (2007) Proc. IEEE S & P 2007 , pp. 51-65
    • Schechter, S.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 21
    • 76649142615 scopus 로고    scopus 로고
    • Securityfocus.com, Defenses lacking at social network sites (December 31, 2003)
    • Securityfocus.com, Defenses lacking at social network sites (December 31, 2003)
  • 22
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Vaudenay, S.: Secure Communications over Insecure Channels based on Short Authenticated Strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 23
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 24
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security: Why do good users make bad decisions?
    • West, R.: The Psychology of Security: Why do Good Users Make Bad Decisions? Communications of the ACM 51(4), 34-40 (2008)
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 25
    • 76649121409 scopus 로고    scopus 로고
    • Wireless USB Promoter Group, Wireless USB Specification Revision 1.0 (May 12, 2005)
    • Wireless USB Promoter Group, Wireless USB Specification Revision 1.0 (May 12, 2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.