Sciweavers

1365 search results - page 10 / 273
» Simple authentication for the web
Sort
View
GI
2008
Springer
14 years 10 months ago
Authenticity: The missing link in the social semantic web
Abstract: Especially data on social network services (SNS) is linked to online personas. Our analysis has shown that no reliably solution for origin authentication is in widespread...
Bastian Braun, Henrich Christopher Pöhls
PET
2010
Springer
15 years 1 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
15 years 6 months ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon
INTERACT
2003
14 years 11 months ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale
TCS
2008
14 years 9 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven