Sciweavers

16 search results - page 3 / 4
» login 2006
Sort
View
ISBI
2006
IEEE
14 years 9 months ago
Closed and open source neuroimage analysis tools and libraries at UNC
The emergence of open-source libraries and development tools in the last decade has changed the process of academic software development in many ways. In medical image processing ...
Martin Andreas Styner, Matthieu Jomier, Guido Geri...
ACSAC
2006
IEEE
14 years 3 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
INFOCOM
2006
IEEE
14 years 2 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
SOUPS
2006
ACM
14 years 2 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
SOUPS
2006
ACM
14 years 2 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little