Sciweavers

1018 search results - page 142 / 204
» Remote User Authentication Using Public Information
Sort
View
SIGUCCS
2004
ACM
14 years 1 months ago
Online solutions: looking to the future of knowledgeBase management
The Princeton University Help Desk KnowledgeBase (KB) is a searchable online information system that publishes Princetonspecific computer solutions to better serve the University ...
Annie Saunders
CCS
2009
ACM
14 years 2 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
USENIX
2000
13 years 9 months ago
Traffic Data Repository at the WIDE Project
It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describe...
Kenjiro Cho, Koushirou Mitsuya, Akira Kato
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ECRIME
2007
13 years 12 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley