This doctoral research aims to persuade users to choose and remember more secure text passwords. The first component involved user studies demonstrating that users can be persuade...
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...