Sciweavers

DIM
2008
ACM
13 years 5 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
DIM
2008
ACM
13 years 6 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
DIM
2008
ACM
13 years 6 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
DIM
2008
ACM
13 years 6 months ago
Symmetric identity federation for fixed-mobile convergence
Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi
DIM
2008
ACM
13 years 6 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
DIM
2008
ACM
13 years 6 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
DIM
2008
ACM
13 years 6 months ago
Identity federation and privacy: one step beyond
Sébastien Canard, Eric Malville, Jacques Tr...