Sciweavers

233 search results - page 2 / 47
» CAPTCHA: Using Hard AI Problems for Security
Sort
View
AINA
2010
IEEE
13 years 8 months ago
Against Spyware Using CAPTCHA in Graphical Password Scheme
—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are...
Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 7 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
ICC
2007
IEEE
147views Communications» more  ICC 2007»
13 years 10 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
ACSAC
2001
IEEE
13 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
13 years 9 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...