BogusBiter: A transparent protection against phishing attacks
Many anti-phishing mechanisms currently focus on helping users verify whether a Web site
is genuine. However, usability studies have demonstrated that prevention-based …
is genuine. However, usability studies have demonstrated that prevention-based …
Exploring usability effects of increasing security in click-based graphical passwords
Graphical passwords have been proposed to address known problems with traditional text
passwords. For example, memorable user-chosen text passwords are predictable, but …
passwords. For example, memorable user-chosen text passwords are predictable, but …
A billion keys, but few locks: the crisis of web single sign-on
OpenID and InfoCard are two mainstream Web single sign-on (SSO) solutions intended for
Internet-scale adoption. While they are technically sound, the business model of these …
Internet-scale adoption. While they are technically sound, the business model of these …
[图书][B] User-centric Privacy: A Usable and Provider-independent Privacy Infrastructure
JP Kolter - 2010 - books.google.com
Today's offered services in the World Wide Web increasingly rely on the disclosure of private
user information. Service providers' appetite for personal user data, however, is …
user information. Service providers' appetite for personal user data, however, is …
PwdIP-Hash: A lightweight solution to phishing and pharming attacks
We present a novel lightweight password-based solution that safeguards users from
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …
[PDF][PDF] The usable security of passwords based on digital objects: From design and analysis to user study
Despite all efforts, password schemes intended to deploy or encourage the use of strong
passwords have largely failed. As an interesting alternative to enable users to create …
passwords have largely failed. As an interesting alternative to enable users to create …
Enhancing web browsing security
C Yue - 2010 - scholarworks.wm.edu
Web browsing has become an integral part of our lives, and we use browsers to perform
many important activities almost everyday and everywhere. However, due to the …
many important activities almost everyday and everywhere. However, due to the …
System security, platform security and usability
PC van Oorschot - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
Scalable trusted computing seeks to apply and extend the fundamental technologies of
trusted computing to large-scale systems. To provide the functionality demanded by users …
trusted computing to large-scale systems. To provide the functionality demanded by users …
[PDF][PDF] PwdIP-Hash
We present a novel lightweight password-based solution that safeguards users from
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …
Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi [Master Thesis]
M Yücel - 2010 - gcris.etu.edu.tr
Kullanıcı adı ve şifre kullanarak kimlik kanıtlama güvenli erişim gerektiren uygulamalar için
çok yaygın olarak kullanılan bir yöntemdir. Kullanıcıların çok kolay tahmin edilebilen şifreler …
çok yaygın olarak kullanılan bir yöntemdir. Kullanıcıların çok kolay tahmin edilebilen şifreler …