Sciweavers

93
Voted
DIM
2008
ACM
14 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
73
Voted
DIM
2008
ACM
14 years 10 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
DIM
2008
ACM
14 years 10 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
DIM
2008
ACM
14 years 10 months ago
Symmetric identity federation for fixed-mobile convergence
Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi
DIM
2008
ACM
14 years 10 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
DIM
2008
ACM
14 years 10 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
DIM
2008
ACM
14 years 10 months ago
Identity federation and privacy: one step beyond
Sébastien Canard, Eric Malville, Jacques Tr...