Sciweavers

15379 search results - page 3 / 3076
» Protecting users from
Sort
View
SEC
2008
13 years 9 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
ESORICS
2011
Springer
12 years 7 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
MIDDLEWARE
2007
Springer
14 years 1 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
WWW
2006
ACM
14 years 8 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 11 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir