Sciweavers

3451 search results - page 169 / 691
» Security of Backup Data
Sort
View
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 11 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
CCS
2004
ACM
15 years 10 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
135
Voted
CCS
1999
ACM
15 years 9 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel
167
Voted
FOSAD
2000
Springer
15 years 8 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
SEC
2007
15 years 6 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin