Sciweavers

18 search results - page 2 / 4
» soups 2006
Sort
View
SOUPS
2006
ACM
13 years 11 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
SOUPS
2006
ACM
13 years 11 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
SOUPS
2006
ACM
13 years 11 months ago
Human selection of mnemonic phrase-based passwords
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to stre...
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
ALIFE
2006
13 years 5 months ago
Self-Replication and Self-Assembly for Manufacturing
It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing....
Robert Ewaschuk, Peter D. Turney
SMI
2006
IEEE
147views Image Analysis» more  SMI 2006»
13 years 11 months ago
Smoothing by Example: Mesh Denoising by Averaging with Similarity-Based Weights
In this paper, we propose a new and powerful shape denoising technique for processing surfaces approximated by triangle meshes and soups. Our approach is inspired by recent non-lo...
Shin Yoshizawa, Alexander G. Belyaev, Hans-Peter S...