-
3
-
-
80053049348
-
-
BSI: The New ID-Card, https://www.bsi.bund.de/cln-174/ContentBSI/Themen/ Elekausweise/Personalausweis/ePA-Start.html.
-
BSI: The New ID-Card
-
-
-
5
-
-
80052977581
-
-
Java Smart Card I/O, http://java.sun.com/javase/6/docs/jre/api/security/ smartcardio/spec/
-
Java Smart Card I/O
-
-
-
6
-
-
84881415081
-
-
Logitech Wireless N305, http://www.logitech.com/en-us/keyboards/keyboard/ devices/6355
-
Logitech Wireless N305
-
-
-
7
-
-
0027678308
-
Authentication and delegation with smart-cards
-
Abadi, M., Burrows, C., Kaufman, C., Lampson, B.: Authentication and delegation with smart-cards. Science of Computer Programming 21(2), 93-113 (1993)
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 93-113
-
-
Abadi, M.1
Burrows, C.2
Kaufman, C.3
Lampson, B.4
-
8
-
-
0030652931
-
Cardwatch: A Neural Network Based Database Mining System for Credit Card Fraud Detection
-
Aleskerov, E., Freisleben, B., Rao, B.: Cardwatch: A Neural Network Based Database Mining System For Credit Card Fraud Detection. In: Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), March 23-25, pp. 220-226 (1997)
-
(1997)
Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), March 23-25
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
9
-
-
48849113355
-
An Empirical Evaluation of the System Usability Scale
-
Bangor, A., Kortum, P., Miller, J.: An Empirical Evaluation Of The System Usability Scale. Int. J. Hum. Comput. Interaction 24(6), 574-594 (2008)
-
(2008)
Int. J. Hum. Comput. Interaction
, vol.24
, Issue.6
, pp. 574-594
-
-
Bangor, A.1
Kortum, P.2
Miller, J.3
-
10
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
11
-
-
0002020833
-
SUS: A "Quick And Dirty" Usability Scale
-
Jordan, P.W., Thomas, B., Weerdmeester, B.A., McClelland, A.L. (eds.) Taylor and Francis, London
-
Brooke, J.: SUS: A "Quick And Dirty" Usability Scale. In: Jordan, P.W., Thomas, B., Weerdmeester, B.A., McClelland, A.L. (eds.) Usability Evaluation in Industry. Taylor and Francis, London (1996)
-
(1996)
Usability Evaluation in Industry
-
-
Brooke, J.1
-
12
-
-
0033336136
-
Distributed Data Mining in Credit Card Fraud Detection
-
Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining In Credit Card Fraud Detection. IEEE Intelligent Systems 14(6), 67-74 (1999)
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
, pp. 67-74
-
-
Chan, P.K.1
Fan, W.2
Prodromidis, A.L.3
Stolfo, S.J.4
-
13
-
-
70349301622
-
RFIDs and Secret Handshakes: Defending Against Ghost-And-Leech Attacks and Unauthorized Reads with Context-Aware Communications
-
ACM, New York
-
Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs And Secret Handshakes: Defending Against Ghost-And-Leech Attacks And Unauthorized Reads With Context-Aware Communications. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 479-490. ACM, New York (2008)
-
(2008)
CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 479-490
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.R.3
Kohno, T.4
-
14
-
-
0016092372
-
A User Authentication Scheme Not Requiring Secrecy in the Computer
-
Evans Jr., A., Kantrowitz, W., Weiss, E.: A User Authentication Scheme Not Requiring Secrecy In The Computer. Commun. ACM 17(8), 437-442 (1974)
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans Jr., A.1
Kantrowitz, W.2
Weiss, E.3
-
15
-
-
77953971010
-
Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords
-
ACM, New York
-
Forget, A., Chiasson, S., Biddle, R.: Shoulder-Surfing Resistance With Eye-Gaze Entry In Cued-Recall Graphical Passwords. In: CHI 2010: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 1107-1110. ACM, New York (2010)
-
(2010)
CHI 2010: Proceedings of the 28th International Conference on Human Factors in Computing Systems
, pp. 1107-1110
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
16
-
-
38549131714
-
Vulnerabilities in firstgeneration RFID-enabled credit cards
-
Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. Springer, Heidelberg
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities in firstgeneration RFID-enabled credit cards. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 2-14. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
17
-
-
33845240394
-
Crossing borders: Security and privacy issues of the european e-passport
-
Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. Springer, Heidelberg
-
Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing borders: Security and privacy issues of the european e-passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4266
, pp. 152-167
-
-
Hoepman, J.-H.1
Hubbers, E.2
Jacobs, B.3
Oostdijk, M.4
Schreur, R.W.5
-
18
-
-
0003900673
-
-
May
-
Housley, R., Ford, W., Polk, W., Solo, D.: Rfc 5280: Internet X.509 Public Key Infrastructure Certificate and CRL profile (May 2008)
-
(2008)
Rfc 5280: Internet X.509 Public Key Infrastructure Certificate and CRL Profile
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
19
-
-
33847249519
-
Security and Privacy Issues in E-Passports
-
Juels, A., Molnar, D., Wagner, D.: Security And Privacy Issues In E-Passports. In: International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 74-88 (2005)
-
(2005)
International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
21
-
-
70350738597
-
Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods
-
Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., Wang, Y.: Serial Hook-Ups: A Comparative Usability Study Of Secure Device Pairing Methods. In: SOUPS: Symposium on Usable Privacy and Security (2009)
-
SOUPS: Symposium on Usable Privacy and Security (2009)
-
-
Kobsa, A.1
Sonawalla, R.2
Tsudik, G.3
Uzun, E.4
Wang, Y.5
-
22
-
-
2942674608
-
Survey of Fraud Detection Techniques
-
Kou, Y., Lu, C.-T., Sirwongwattana, S., Huang, Y.-P.: Survey Of Fraud Detection Techniques. In: 2004 IEEE International Conference on Networking, Sensing and Control, vol. 2, pp. 749-754 (2004)
-
(2004)
2004 IEEE International Conference on Networking, Sensing and Control
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Lu, C.-T.2
Sirwongwattana, S.3
Huang, Y.-P.4
-
23
-
-
70349332824
-
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
-
Kumar, A., Saxena, N., Tsudik, G., Uzun, E.: Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. In: IEEE International Conference on Pervasive Computing and Communications, PerCom (2009)
-
IEEE International Conference on Pervasive Computing and Communications, PerCom (2009)
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
24
-
-
0004179384
-
-
Technical Memo MIT/LCS/TM-542b, Massachusetts Institute of Technology
-
Micali, S.: Efficient Certificate Revocation. Technical Memo MIT/LCS/TM-542b, Massachusetts Institute of Technology (1996)
-
(1996)
Efficient Certificate Revocation
-
-
Micali, S.1
-
25
-
-
37849050336
-
Certificate Revocation System
-
United States Patent 5,666,416 September
-
Micali, S.: Certificate Revocation System. United States Patent 5,666,416 (September 1997)
-
(1997)
-
-
Micali, S.1
-
26
-
-
0004115865
-
Internet Public Key Infrastructure Online Certificate Status Protocol- Ocsp
-
Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: Internet Public Key Infrastructure Online Certificate Status Protocol- Ocsp. RFC 2560 (1999), http://tools.ietf.org/html/rfc2560
-
(1999)
RFC
, vol.2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
27
-
-
78650034784
-
Groupthink: Usability of Secure Group Association for Wireless Devices
-
Nithyanand, R., Saxena, N., Tsudik, G., Uzun, E.: Groupthink: Usability Of Secure Group Association For Wireless Devices. In: 12th ACM International Conference on Ubiquitous Computing, Ubicomp 2010 (2010)
-
(2010)
12th ACM International Conference on Ubiquitous Computing, Ubicomp 2010
-
-
Nithyanand, R.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
28
-
-
78049451613
-
Readers Behaving Badly
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers Behaving Badly. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 19-36. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 19-36
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
29
-
-
68849111318
-
Secure pairing of "Interface-constrained" devices resistant against rushing user behavior
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Saxena, N., Uddin, M. B.: Secure pairing of "Interface- constrained" devices resistant against rushing user behavior. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 34-52. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 34-52
-
-
Saxena, N.1
Uddin, M.B.2
-
30
-
-
79955634057
-
Treat 'em Like Other Devices: User Authentication of Multiple Personal RFID Tags
-
ACM, New
-
Saxena, N., Uddin, M.B., Voris, J.: Treat 'em Like Other Devices: User Authentication of Multiple Personal RFID Tags. In: SOUPS 2009: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 1. ACM, New (2009)
-
(2009)
SOUPS 2009: Proceedings of the 5th Symposium on Usable Privacy and Security
, pp. 1
-
-
Saxena, N.1
Uddin, M.B.2
Voris, J.3
-
31
-
-
77955322016
-
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Perković, T., Čagalj, M., Saxena, N.: Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 351-358. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 351-358
-
-
Perković, T.1
Čagalj, M.2
Saxena, N.3
-
32
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. Springer, Heidelberg
-
Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
|