Sciweavers

152 search results - page 24 / 31
» Protecting Users Against Phishing Attacks with AntiPhish
Sort
View
CCS
2010
ACM
13 years 8 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
IAT
2006
IEEE
14 years 1 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
CHI
2010
ACM
14 years 2 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
CCS
2011
ACM
12 years 7 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 9 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....