Sciweavers

15379 search results - page 251 / 3076
» Protecting users from
Sort
View
ECRIME
2007
15 years 3 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
DRM
2006
Springer
15 years 2 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
NIPS
2008
15 years 18 days ago
Breaking Audio CAPTCHAs
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
Jennifer Tam, Jirí Simsa, Sean Hyde, Luis v...
FGCS
2008
140views more  FGCS 2008»
14 years 11 months ago
Allocation strategies for utilization of space-shared resources in Bag of Tasks grids
As the adoption of grid computing in organizations expands, the need for wise utilization of different types of resources also increases. A volatile resource, such as a desktop co...
César A. F. De Rose, Tiago C. Ferreto, Rodr...
CSCW
2010
ACM
15 years 8 months ago
What's it worth to you?: the costs and affordances of CMC tools to asian and american users
In recent years, a growing number of studies examining how culture shapes computer-mediated communication (CMC) have appeared in the CHI and CSCW literature. Findings from these s...
Leslie D. Setlock, Susan R. Fussell