Sciweavers

5722 search results - page 163 / 1145
» Security Function Interactions
Sort
View
86
Voted
CHI
2010
ACM
15 years 7 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
110
Voted
CHI
2006
ACM
16 years 1 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
MHCI
2009
Springer
15 years 7 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
114
Voted
ICALP
2001
Springer
15 years 5 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
80
Voted
CHI
2007
ACM
16 years 1 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...