Sciweavers

920 search results - page 43 / 184
» Selecting Secure Passwords
Sort
View
125
Voted
CCS
2007
ACM
15 years 11 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
CCS
2008
ACM
15 years 7 months ago
Automatic feature selection for anomaly detection
Marius Kloft, Ulf Brefeld, Patrick Düssel, Ch...
MEDIAFORENSICS
2010
15 years 3 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
SOUPS
2005
ACM
15 years 11 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar