Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
Abstract. The recent development of location-based services has originated a set of new security services that address their particular security problems. Spatial-temporal certific...
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...