Sciweavers

179 search results - page 19 / 36
» Learning at Low False Positive Rates
Sort
View
CHI
2008
ACM
14 years 7 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
SP
2007
IEEE
14 years 1 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
KES
2007
Springer
14 years 1 months ago
Hand Geometry Verification Using Time Series Representation
Biometric authentication based on human physical traits has recently been heavily studied; these biometric sources include face, hand geometry, voice, fingerprint, iris, retina, et...
Vit Niennattrakul, Dachawut Wanichsan, Chotirat An...
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
DAGSTUHL
2006
13 years 9 months ago
A System for Object Class Detection
A successful detection and classification system must have two properties: it should be general enough to compensate for intra-class variability and it should be specific enough to...
Daniela Hall