Sciweavers

524 search results - page 9 / 105
» Why phishing works
Sort
View
CN
2007
93views more  CN 2007»
13 years 8 months ago
Why TCP timers (still) don't work well
We argue that the design principles of the TCP timeout algorithm are based solely on RTT estimations and may lead to flow synchronization, unnecessary retransmission effort and ...
Ioannis Psaras, Vassilis Tsaoussidis
SIGMOD
2002
ACM
81views Database» more  SIGMOD 2002»
13 years 8 months ago
Why I Like Working in Academia
Richard T. Snodgrass
CHI
2007
ACM
14 years 8 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CCS
2007
ACM
14 years 2 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
SIGMETRICS
2012
ACM
347views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
Temperature management in data centers: why some (might) like it hot
The energy consumed by data centers is starting to make up a significant fraction of the world’s energy consumption and carbon emissions. A large fraction of the consumed energ...
Nosayba El-Sayed, Ioan A. Stefanovici, George Amvr...