Sciweavers

3482 search results - page 225 / 697
» Designing for security
Sort
View
SOUPS
2010
ACM
14 years 1 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
TPDS
2008
121views more  TPDS 2008»
13 years 9 months ago
Secure Collaboration in a Mediator-Free Distributed Environment
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
Mohamed Shehab, Arif Ghafoor, Elisa Bertino
IJIPT
2010
147views more  IJIPT 2010»
13 years 8 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
IDTRUST
2009
ACM
14 years 4 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
CHI
2010
ACM
14 years 4 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon