Sciweavers

43 search results - page 5 / 9
» fc 2007
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 2 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 2 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
FC
2007
Springer
106views Cryptology» more  FC 2007»
14 years 2 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
FC
2007
Springer
105views Cryptology» more  FC 2007»
14 years 2 months ago
Phishing IQ Tests Measure Fear, Not Ability
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from exist...
Vivek Anandpara, Andrew Dingman, Markus Jakobsson,...
FC
2007
Springer
105views Cryptology» more  FC 2007»
14 years 13 days ago
Space-Efficient Private Search with Applications to Rateless Codes
Abstract. Private keyword search is a technique that allows for searching and retrieving documents matching certain keywords without revealing the search criteria. We improve the s...
George Danezis, Claudia Díaz