This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
The mobile phone has become one of the essential objects that people carry when they leave home. By conducting a series of street interviews in 11 cities on 4 continents, we attemp...
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
In this paper we present a design for IEEE 1149.1 Test Access Port (TAP)controllers that is based on a practical reuse methodology. While the basic use and core functionality of T...