-
2
-
-
51849153945
-
Beam auth: Two-factorweb authentication with a bookmark
-
Adida, B.: BeamAuth: Two-FactorWeb Authentication with a Bookmark. In: Proc. ACM CCS 2007, pp. 48-57 (2007)
-
(2007)
Proc. ACM CCS 2007
, pp. 48-57
-
-
Adida, B.1
-
3
-
-
35248831179
-
CAPTCHA: Using hard ai problems for security
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.2656, pp. 294-311. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
4
-
-
42149191219
-
Faith-based security: A tongue-in-cheek look at serious security issues
-
Berghel, H.: Faith-based Security: A Tongue-in-Cheek Look at Serious Security Issues. Communications of the ACM 51(4), 13-17 (2008)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 13-17
-
-
Berghel, H.1
-
5
-
-
76649112971
-
-
Bluetooth SIG Bluetooth Core Specification v2.1 EDR (July 26, 2007)
-
Bluetooth SIG: Bluetooth Core Specification v2.1 EDR (July 26, 2007)
-
-
-
-
6
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
50949100007
-
-
IACR Cryptology ePrint Archive, report 2007/399 (last revised October 17)
-
Ellison, C.: Ceremony Design and Analysis. IACR Cryptology ePrint Archive, report 2007/399 (last revised October 17, 2007)
-
(2007)
Ceremony Design and Analysis
-
-
Ellison, C.1
-
9
-
-
70349744780
-
Privacy protection for social networking platforms
-
Felt, A., Evans, D.: Privacy Protection for Social Networking Platforms. In: Proc. W2SP 2008 (2008)
-
(2008)
Proc. W2SP 2008
-
-
Felt, A.1
Evans, D.2
-
10
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
Garfinkel, S.L.: Email-based Identification and Authentication: an Alternative to PKI? IEEE S & P 1(6), 20-26 (2003)
-
(2003)
IEEE S & P
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.L.1
-
12
-
-
79960851673
-
Conditioned-safe ceremonies and a user study of an application to web authentication
-
(to appear)
-
Karlof, C., Tygar, J.D.,Wagner, D.: Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In: Proc. NDSS 2009 (to appear, 2009)
-
(2009)
Proc. NDSS 2009
-
-
Karlof, C.1
Tygar, J.D.2
Wagner, D.3
-
13
-
-
84957649548
-
Identity escrow
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 169-185. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
15
-
-
38549099144
-
On the security of a popular web submission and review software
-
Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
-
Lo, S.-W., Phan, R.C.-W., Goi, B.-M.: On the Security of a Popular Web Submission and Review Software. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.4867, pp. 245-265. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4867
, pp. 245-265
-
-
Lo, S.-W.1
Phan, R.C.-W.2
Goi, B.-M.3
-
17
-
-
65449137148
-
Personal knowledge questions for fallback authentication: Security questions in the era of facebook
-
Rabkin, A.: Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook. In: Proc. SOUPS 2008, pp. 13-23 (2008)
-
(2008)
Proc. SOUPS 2008
, pp. 13-23
-
-
Rabkin, A.1
-
18
-
-
0035387175
-
Transforming the 'weakest Link': A Human- Computer interaction approach to usable and effective security
-
Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the 'Weakest Link': a Human- Computer Interaction Approach to Usable and Effective Security. BT Technology Journal 19(3), 122-131 (2001)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
19
-
-
34548786769
-
Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: Emperor's New Security Indicators: an Evaluation of Website Authentication and the Effect of Role Playing on Usability Studies. In: Proc. IEEE S & P 2007, pp. 51-65 (2007)
-
(2007)
Proc. IEEE S & P 2007
, pp. 51-65
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
21
-
-
76649142615
-
-
Securityfocus.com, Defenses lacking at social network sites (December 31, 2003)
-
Securityfocus.com, Defenses lacking at social network sites (December 31, 2003)
-
-
-
-
22
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Vaudenay, S.: Secure Communications over Insecure Channels based on Short Authenticated Strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
23
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
24
-
-
42149161709
-
The psychology of security: Why do good users make bad decisions?
-
West, R.: The Psychology of Security: Why do Good Users Make Bad Decisions? Communications of the ACM 51(4), 34-40 (2008)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
25
-
-
76649121409
-
-
Wireless USB Promoter Group, Wireless USB Specification Revision 1.0 (May 12, 2005)
-
Wireless USB Promoter Group, Wireless USB Specification Revision 1.0 (May 12, 2005)
-
-
-
|