A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers that are connected to the Internet. The resulting distributed compu...