Sciweavers

712 search results - page 63 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CCS
2010
ACM
15 years 1 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou
CCS
2008
ACM
14 years 12 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
CHI
2009
ACM
15 years 10 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
85
Voted
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ACSAC
1998
IEEE
15 years 2 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron