-
3
-
-
39149098302
-
-
W3C Working Group, Note23, Nov.
-
W3C Working Group, "Inaccessibility of CAPTCHA," Note 23, Nov. 2005.
-
(2005)
Inaccessibility of CAPTCHA
-
-
-
4
-
-
84974757646
-
A high assurance window system prototype
-
J. Epstein, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. R. Martin, M. Branstad, G. Benson, and D. Rothnie, "A high assurance window system prototype," Journal of Computer Security, vol. 2, no. 2, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
-
-
Epstein, J.1
McHugh, J.2
Orman, H.3
Pascale, R.4
Marmor-Squires, A.5
Danner, B.6
Martin, C.R.7
Branstad, M.8
Benson, G.9
Rothnie, D.10
-
8
-
-
70350757761
-
Usable security: How to get it
-
B. Lampson, "Usable security: How to get it," Communications of the ACM, vol. 52, no. 11, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
-
-
Lampson, B.1
-
9
-
-
33644482378
-
-
AMD, AMD, Tech. Rep. Publication Number 33047, Revision 3. 01, May
-
AMD, "AMD64 virtualization codenamed "Pacifica" technology - secure virtual machine architecture reference manual," AMD, Tech. Rep. Publication Number 33047, Revision 3.01, May 2005.
-
(2005)
AMD64 Virtualization Codenamed " Pacifica" Technology - Secure Virtual Machine Architecture Reference Manual,"
-
-
-
10
-
-
42549137149
-
Intel trusted execution technology MLE developer's guide
-
Intel Corporation. Dec.
-
Intel Corporation, "Intel trusted execution technology MLE developer's guide," Intel Corporation, Tech. Rep. Document Number: 315168-006, Dec. 2009.
-
(2009)
Intel Corporation, Tech. Rep. Document Number: 315168-006
-
-
-
12
-
-
33646680778
-
What do they indicate? evaluating security and privacy indicators
-
L. F. Cranor, "What do they indicate? evaluating security and privacy indicators," Interactions, vol. 13, no. 3, 2006.
-
(2006)
Interactions
, vol.13
, Issue.3
-
-
Cranor, L.F.1
-
13
-
-
74049155648
-
The emperor's new security indicators
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The emperor's new security indicators," in Proc. IEEE Symposium on Security and Privacy, 2007.
-
(2007)
Proc. IEEE Symposium on Security and Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
15
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, "Flicker: An execution infrastructure for TCB minimization," in Proc. ACM SIGOPS European Conference on Computer Systems (EuroSys), 2008.
-
(2008)
Proc. ACM SIGOPS European Conference on Computer Systems (EuroSys)
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
17
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," in Proc. ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
Proc. ACM Symposium on Operating Systems Principles (SOSP)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
18
-
-
51949119355
-
SHype: Secure hypervisor approach to trusted virtualized systems
-
Feb.
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger, "sHype: Secure hypervisor approach to trusted virtualized systems," IBM Research Division, Tech. Rep. RC23511, Feb. 2005.
-
(2005)
IBM Research Division, Tech. Rep. RC23511
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
19
-
-
80051951603
-
-
European Multilaterally Secure Computing Base Project, "Turaya," http://www.emscb.org/content/pages/turaya.htm.
-
-
-
-
21
-
-
38849110322
-
Prerendered user interfaces for higher-assurance electronic voting
-
K.-P. Yee, D. Wagner, M. Hearst, and S. M. Bellovin, "Prerendered user interfaces for higher-assurance electronic voting," in Proc. USENIX Electronic Voting Technology Workshop, 2006.
-
(2006)
Proc. USENIX Electronic Voting Technology Workshop
-
-
Yee, K.-P.1
Wagner, D.2
Hearst, M.3
Bellovin, S.M.4
-
22
-
-
84869631091
-
Solving and creating captchas with free porn
-
Jan.
-
C. Doctorow, "Solving and creating captchas with free porn," Boing Boing, Jan. 2004.
-
(2004)
Boing Boing
-
-
Doctorow, C.1
-
24
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon, "Strong password-only authenticated key exchange," Computer Communication Review, vol. 26, 1996.
-
(1996)
Computer Communication Review
, vol.26
-
-
Jablon, D.P.1
-
26
-
-
34548150723
-
Compartmented security for browsers - Or how to thwart a phisher with trusted computing
-
S. Gajek, A.-R. Sadeghi, C. Stüble, and M. Winandy, "Compartmented security for browsers - or how to thwart a phisher with trusted computing," in Proc. Conference on Availability, Reliability and Security (ARES), 2007.
-
(2007)
Proc. Conference on Availability, Reliability and Security (ARES)
-
-
Gajek, S.1
Sadeghi, A.-R.2
Stüble, C.3
Winandy, M.4
-
28
-
-
39049092821
-
Delegate: A proxy based architecture for secure website access from an untrusted machine
-
R. C. Jammalamadaka, T. W. van der Horst, S. Mehrotra, K. E. Seamons, and N. Venkasubramanian, "Delegate: A proxy based architecture for secure website access from an untrusted machine," in Proc. Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Proc. Annual Computer Security Applications Conference (ACSAC)
-
-
Jammalamadaka, R.C.1
Van Der Horst, T.W.2
Mehrotra, S.3
Seamons, K.E.4
Venkasubramanian, N.5
-
30
-
-
82055183861
-
TruWalletM: Secure web authentication on mobile platforms
-
S. Bugiel, A. Dmitrienko, K. Kostiainen, A.-R. Sadeghi, and M. Winandy, "TruWalletM: Secure web authentication on mobile platforms," in Proc. Trusted Systems, Second International Conference (INTRUST), 2011.
-
(2011)
Proc. Trusted Systems, Second International Conference (INTRUST)
-
-
Bugiel, S.1
Dmitrienko, A.2
Kostiainen, K.3
Sadeghi, A.-R.4
Winandy, M.5
-
34
-
-
80051942334
-
Anonymous authentication with TLS and DAA
-
E. Cesena, H. Löhr, G. Ramunno, A.-R. Sadeghi, and D. Vernizzi, "Anonymous authentication with TLS and DAA," in Proc. Conference on Trust and Trustworthy Computing (TRUST), 2010.
-
(2010)
Proc. Conference on Trust and Trustworthy Computing (TRUST)
-
-
Cesena, E.1
Löhr, H.2
Ramunno, G.3
Sadeghi, A.-R.4
Vernizzi, D.5
-
35
-
-
80051940560
-
-
FreeWebShop.org, http://www.freewebshop.org.
-
-
-
-
36
-
-
21644433634
-
Xen and the art of virtualization
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer, "Xen and the art of virtualization," in Proc. ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
Proc. ACM Symposium on Operating Systems Principles (SOSP)
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
37
-
-
84886006499
-
Reversing and exploiting an Apple firmware update
-
K. Chen, "Reversing and exploiting an Apple firmware update," in Black Hat, 2009.
-
(2009)
Black Hat
-
-
Chen, K.1
-
38
-
-
80051937558
-
An experimental investigation of the usability of transaction authorization in online bank security systems
-
M. AlZomai, B. AlFayyadh, A. Jøsang, and A. McCullagh, "An experimental investigation of the usability of transaction authorization in online bank security systems," in Proc. Australasian Information Security Conference (ACSC), 2008.
-
(2008)
Proc. Australasian Information Security Conference (ACSC)
-
-
Alzomai, M.1
Alfayyadh, B.2
Jøsang, A.3
McCullagh, A.4
-
41
-
-
80051916671
-
-
IBM Zurich Research Lab, Press release, Oct.
-
IBM Zurich Research Lab, "Security on a stick," Press release, Oct. 2008.
-
(2008)
Security on A Stick
-
-
-
42
-
-
77952418081
-
2-clickAuth - Optical challenge-response authentication
-
A. Vapen, D. Byers, and N. Shahmehri, "2-clickAuth - optical challenge-response authentication," in Proc. Conference on Availability, Reliability and Security (ARES), 2010.
-
(2010)
Proc. Conference on Availability, Reliability and Security (ARES)
-
-
Vapen, A.1
Byers, D.2
Shahmehri, N.3
-
43
-
-
80051921641
-
The Zurich Trusted Information Channel - An efficient defence against man-in-the-middle and malicious software attacks
-
T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler, and M. Baentsch, "The Zurich Trusted Information Channel - an efficient defence against man-in-the-middle and malicious software attacks," in Proc. Conference on Trust and Trustworthy Computing (TRUST), 2008.
-
(2008)
Proc. Conference on Trust and Trustworthy Computing (TRUST)
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Höring, F.4
Buhler, P.5
Baentsch, M.6
-
44
-
-
77954714989
-
-
CVE-2007-4993
-
"Elevated privileges," CVE-2007-4993, 2007.
-
(2007)
Elevated Privileges
-
-
-
48
-
-
85076925998
-
Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks
-
Apr.
-
R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy, "Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks," in Proc. Network Systems Design and Implementation (NSDI), Apr. 2009.
-
(2009)
Proc. Network Systems Design and Implementation (NSDI)
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
50
-
-
51849104627
-
TrustZone: Integrated hardware and software security
-
T. Alves and D. Felton, "TrustZone: Integrated hardware and software security," Information Quaterly, vol. 3, no. 4, 2004.
-
(2004)
Information Quaterly
, vol.3
, Issue.4
-
-
Alves, T.1
Felton, D.2
-
51
-
-
74049088382
-
On-board credentials with open provisioning
-
K. Kostiainen, J.-E. Ekberg, N. Asokan, and A. Rantala, "On-board credentials with open provisioning," in Proc. Symposium on Information, Computer, and Communications Security (ASIACCS), 2009.
-
(2009)
Proc. Symposium on Information, Computer, and Communications Security (ASIACCS)
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
|