Sciweavers

15379 search results - page 153 / 3076
» Protecting users from
Sort
View
CCS
2007
ACM
14 years 2 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
ICCS
2007
Springer
14 years 2 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
SACMAT
2006
ACM
14 years 1 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
MM
2005
ACM
114views Multimedia» more  MM 2005»
14 years 1 months ago
IMAGINATION: a robust image-based CAPTCHA generation system
We propose IMAGINATION (IMAge Generation for INternet AuthenticaTION), a system for the generation of attack-resistant, user-friendly, image-based CAPTCHAs. In our system, we prod...
Ritendra Datta, Jia Li, James Ze Wang
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 1 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson