-
1
-
-
34249885740
-
Privacy preserving multi-factor authentication with biometrics
-
New York, NY, USA,. ACM
-
A. Bhargav-Spantzel, A. Squicciarini, and E. Bertino. Privacy preserving multi-factor authentication with biometrics. In Proceedings of the Second ACM Workshop on Digital Identity Management, DIM '06, pages 63-72, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM '06
, pp. 63-72
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
2
-
-
84887036858
-
Cd-moa: Change detection framework for massive online analysis
-
A. Tucker, F. Höppner, A. Siebes, and S. Swift, Editors Volume 8207 of Lecture Notes in Computer Science, Springer
-
A. Bifet, J. Read, B. Pfahringer, G. Holmes, and I. Zliobaite. Cd-moa: Change detection framework for massive online analysis. In A. Tucker, F. Höppner, A. Siebes, and S. Swift, editors, IDA, volume 8207 of Lecture Notes in Computer Science, pages 92-103. Springer, 2013.
-
(2013)
IDA
, pp. 92-103
-
-
Bifet, A.1
Read, J.2
Pfahringer, B.3
Holmes, G.4
Zliobaite, I.5
-
3
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
Washington, DC, USA,. IEEE Computer Society
-
J. Bonneau, C. Herley, P. C. V. Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 553-567, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Oorschot, P.C.V.3
Stajano, F.4
-
4
-
-
84895061858
-
A survey on addressing privacy together with quality of context for context management in the internet of things
-
S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P. Marie, and S. M. Marquez. A survey on addressing privacy together with quality of context for context management in the internet of things. Annales des Télécommunications, 69(1-2):47-62, 2014.
-
(2014)
Annales des Télécommunications
, vol.69
, Issue.1-2
, pp. 47-62
-
-
Chabridon, S.1
Laborde, R.2
Desprats, T.3
Oglaza, A.4
Marie, P.5
Marquez, S.M.6
-
5
-
-
84862969473
-
When context is better than identity: Authentication by context using empirical channels
-
B. Christianson, B. Crispo, J. A. Malcolm, and F. Stajano, editors Cambridge, UK, March 28-30, Revised Selected Papers, volume 7114 of Lecture Notes in Computer Science, Springer, 2011
-
B. Chen, L. H. Nguyen, and A. W. Roscoe. When context is better than identity: Authentication by context using empirical channels. In B. Christianson, B. Crispo, J. A. Malcolm, and F. Stajano, editors, Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, volume 7114 of Lecture Notes in Computer Science, pages 115-125. Springer, 2011.
-
(2011)
Security Protocols XIX - 19th International Workshop
, pp. 115-125
-
-
Chen, B.1
Nguyen, L.H.2
Roscoe, A.W.3
-
6
-
-
84873691773
-
Rethinking passwords
-
Feb.
-
W. Cheswick. Rethinking passwords. Commun. ACM, 56(2):40-44, Feb. 2013.
-
(2013)
Commun ACM
, vol.56
, Issue.2
, pp. 40-44
-
-
Cheswick, W.1
-
7
-
-
0036949148
-
Zero-interaction authentication
-
New York, NY, USA, ACM
-
M. D. Corner and B. D. Noble. Zero-interaction Authentication. In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, MobiCom '02, pages 1-11, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, MobiCom '02
, pp. 1-11
-
-
Corner, M.D.1
Noble, B.D.2
-
8
-
-
84955503395
-
-
ACM Press/ Addison-Wesley Publishing Co., New York, NY, USA
-
D. E. Denning and P. F. MacDoran. Internet besieged. chapter Location-based Authentication: Grounding Cyberspace for Better Security, pages 167-174. ACM Press/Addison-Wesley Publishing Co., New York, NY, USA, 1998.
-
(1998)
Internet Besieged. Chapter Location-based Authentication: Grounding Cyberspace for Better Security
, pp. 167-174
-
-
Denning, D.E.1
MacDoran, P.F.2
-
9
-
-
0034592938
-
Mining high-speed data streams
-
New York, NY, USA,. ACM
-
P. Domingos and G. Hulten. Mining high-speed data streams. In Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '00, pages 71-80, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '00
, pp. 71-80
-
-
Domingos, P.1
Hulten, G.2
-
10
-
-
77955457549
-
How unique is your web browser?
-
Berlin, Heidelberg,. Springer-Verlag
-
P. Eckersley. How unique is your web browser? In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pages 1-18, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10
, pp. 1-18
-
-
Eckersley, P.1
-
12
-
-
84883312752
-
Security: Active authentication
-
R. P. Guidorizzi. Security: Active authentication. IT Professional, 15(4):4-7, 2013.
-
(2013)
IT Professional
, vol.15
, Issue.4
, pp. 4-7
-
-
Guidorizzi, R.P.1
-
13
-
-
84883062786
-
CASA: Context-aware scalable authentication
-
New York, NY, USA, ACM
-
E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley. CASA: Context-aware Scalable Authentication. In Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pages 3:1-3:10, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13
, pp. 301-310
-
-
Hayashi, E.1
Das, S.2
Amini, S.3
Hong, J.4
Oakley, I.5
-
14
-
-
84955502699
-
Adaptive access control brings together identity, risk and context
-
Aug
-
T. Henry. Adaptive Access Control Brings Together Identity, Risk and Context. Gartner Report. https://www.gartner.com/doc/2578515/adaptiveaccess- control-brings-identity, Aug 2013.
-
(2013)
Gartner Report
-
-
Henry, T.1
-
15
-
-
85026738968
-
The benefits of understanding passwords
-
Berkeley, CA, USA, USENIX Association
-
M. Jakobsson and M. Dhiman. The benefits of understanding passwords. In Proceedings of the 7th USENIX conference on Hot Topics in Security, HotSec'12, page 10, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 7th USENIX Conference on Hot Topics in Security, HotSec'12
, pp. 10
-
-
Jakobsson, M.1
Dhiman, M.2
-
17
-
-
84894218723
-
Geolocation and verification of IP-addresses with specific focus on ipv6
-
G. Wang, I. Ray, D. Feng, and M. Rajarajan, editors, volume 8300 of Lecture Notes in Computer Science, Springer
-
R. Koch, M. Golling, and G. D. Rodosek. Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. In G. Wang, I. Ray, D. Feng, and M. Rajarajan, editors, CSS, volume 8300 of Lecture Notes in Computer Science, pages 151-170. Springer, 2013.
-
(2013)
CSS
, pp. 151-170
-
-
Koch, R.1
Golling, M.2
Rodosek, G.D.3
-
18
-
-
84926227657
-
Quality of context: Models and applications for context-aware systems in pervasive environments
-
A. Manzoor, H. L. Truong, and S. Dustdar. Quality of context: models and applications for context-aware systems in pervasive environments. Knowledge Eng. Review, 29(2):154-170, 2014.
-
(2014)
Knowledge Eng. Review
, vol.29
, Issue.2
, pp. 154-170
-
-
Manzoor, A.1
Truong, H.L.2
Dustdar, S.3
-
19
-
-
84881238242
-
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
-
Washington, DC, USA, IEEE Computer Society
-
N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 541-555, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
, pp. 541-555
-
-
Nikiforakis, N.1
Kapravelos, A.2
Joosen, W.3
Kruegel, C.4
Piessens, F.5
Vigna, G.6
-
20
-
-
80053267657
-
A contextual approach to privacy online
-
H. Nissenbaum. A Contextual Approach to Privacy Online. Daedalus, 140(4):32-48, 2011.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
21
-
-
84898050084
-
Tlsh - A locality sensitive hash
-
Washington, DC, USA, IEEE Computer Society
-
J. Oliver, C. Cheng, and Y. Chen. Tlsh - a locality sensitive hash. In Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing Workshop, CTC '13, pages 7-13, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing Workshop, CTC '13
, pp. 7-13
-
-
Oliver, J.1
Cheng, C.2
Chen, Y.3
-
22
-
-
78651093858
-
Data fingerprinting with similarity digests
-
2010, Hong Kong, China, January 4-6, Revised Selected Papers
-
V. Roussev. Data fingerprinting with similarity digests. In Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers, pages 207-226, 2010.
-
(2010)
Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics
, pp. 207-226
-
-
Roussev, V.1
-
23
-
-
84955491877
-
Schneier on security
-
Nov.
-
B. Schneier. Schneier on Security. Risk-Based Authentication. https://www.schneier.com/blog/archives/2013/11/risk-based.html, Nov. 2013.
-
(2013)
Risk-Based Authentication.
-
-
Schneier, B.1
-
24
-
-
85037074313
-
Implicit authentication through learning user behavior
-
E. Shi, Y. Niu, M. Jakobsson, and R. Chow. Implicit authentication through learning user behavior. Information Security, pages 99-113, 2011.
-
(2011)
Information Security
, pp. 99-113
-
-
Shi, E.1
Niu, Y.2
Jakobsson, M.3
Chow, R.4
-
25
-
-
84869141956
-
-
2013
-
Verizon. 2013 Data Breach Investigations Report. http://www.verizonenterprise.com/resources/reports/rpdata-breach-investigations-report-2013enxg.pdf, 2013.
-
(2013)
Data Breach Investigations Report.
-
-
Verizon.1
|