-
1
-
-
84856171701
-
Geolocation
-
[Online], Available
-
F. Holzhauer, "Geolocation, " TU Berlin, Tech. Rep., 2007. [Online]. Available: http://www.net.t-labs.tu-berlin.de/teaching/ss07/IMseminar/ aab1.pdf.
-
(2007)
TU Berlin, Tech. Rep.
-
-
Holzhauer, F.1
-
2
-
-
79955586500
-
How unique is your web browser?
-
[Online], Available
-
P. Eckersley, "How unique is your web browser?" Electronics Frontier Foundation, Tech. Rep., 2009. [Online]. Available: https:// panopticlick.eff.org/browser-uniqueness.pdf.
-
(2009)
Electronics Frontier Foundation, Tech. Rep.
-
-
Eckersley, P.1
-
3
-
-
84882750204
-
An analysis of private browsing modes in modern browsers
-
Washington, D.C. USA
-
G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh, "An analysis of private browsing modes in modern browsers, " in USENIX Security'10, Washington, D.C., USA, 2010.
-
(2010)
USENIX Security'10
-
-
Aggarwal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
5
-
-
84856172670
-
-
Tech. Rep., [Online]. Available
-
Mozilla, "Fingerprinting, " Tech. Rep., 2010. [Online]. Available: https://wiki.mozilla.org/Fingerprinting.
-
(2010)
Fingerprinting
-
-
-
6
-
-
62349125999
-
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
-
Salt Lake City, UT, USA
-
G. L. Orgill, G. W. Romney, M. G. Bailey, and P. M. Orgill, "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems, " in CITC5'04, Salt Lake City, UT, USA, 2004.
-
(2004)
CITC5'04
-
-
Orgill, G.L.1
Romney, G.W.2
Bailey, M.G.3
Orgill, P.M.4
-
8
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification, " IEEE Security and Privacy, vol. 2, pp. 40-47, 2004. (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
9
-
-
0030675109
-
Authentication via keystroke dynamics
-
Zurich, Switzerland
-
F. Monrose and A. D. Rubin, "Authentication via keystroke dynamics, " in CCS'97, Zurich, Switzerland, 1997.
-
(1997)
CCS'97
-
-
Monrose, F.1
Rubin, A.D.2
-
10
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
December
-
N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis, " Int. J. Inf. Secur., vol. 6, December 2006.
-
(2006)
Int. J. Inf. Secur.
, vol.6
-
-
Clarke, N.L.1
Furnell, S.M.2
-
11
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
Washington, D.C. USA
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH, " in USENIX Security'01, Washington, D.C., USA, 2001.
-
(2001)
USENIX Security'01
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
12
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
January
-
J. Leggett and G. Williams, "Verifying identity via keystroke characteristics, " Int. J. Man-Mach. Stud., vol. 28, January 1988.
-
(1988)
Int. J. Man-Mach. Stud.
, vol.28
-
-
Leggett, J.1
Williams, G.2
|