Sciweavers

1573 search results - page 122 / 315
» Strong User Authentication
Sort
View
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
WWW
2005
ACM
15 years 10 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
SEC
2008
14 years 11 months ago
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phish...
Yongdong Wu, Haixia Yao, Feng Bao
ICIA
2007
15 years 9 days ago
An Adaptive, Emotional, and Expressive Reminding System
We are currently developing an adaptive, emotional, and expressive interface agent, which learns when and how to notify users about self-assigned tasks and events. In this paper, ...
Nadine Richard, Seiji Yamada
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 4 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta