Sciweavers

2846 search results - page 8 / 570
» Not one click for security
Sort
View
134
Voted
AVI
2006
15 years 4 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
108
Voted
CCS
2011
ACM
14 years 3 months ago
App isolation: get the security of multiple browsers with just one
Eric Yawei Chen, Jason Bau, Charles Reis, Adam Bar...
128
Voted
ACISP
2008
Springer
15 years 5 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
WWW
2007
ACM
16 years 4 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
128
Voted
CIKM
2009
Springer
15 years 10 months ago
Post-rank reordering: resolving preference misalignments between search engines and end users
No search engine is perfect. A typical type of imperfection is the preference misalignment between search engines and end users, e.g., from time to time, web users skip higherrank...
Chao Liu, Mei Li, Yi-Min Wang