Sciweavers

2967 search results - page 519 / 594
» Cryptology
Sort
View
FC
2007
Springer
106views Cryptology» more  FC 2007»
15 years 3 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
FC
2007
Springer
105views Cryptology» more  FC 2007»
15 years 3 months ago
Phishing IQ Tests Measure Fear, Not Ability
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from exist...
Vivek Anandpara, Andrew Dingman, Markus Jakobsson,...
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 3 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 3 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...