BogusBiter: A transparent protection against phishing attacks

C Yue, H Wang - ACM Transactions on Internet Technology (TOIT), 2010 - dl.acm.org
Many anti-phishing mechanisms currently focus on helping users verify whether a Web site
is genuine. However, usability studies have demonstrated that prevention-based …

Exploring usability effects of increasing security in click-based graphical passwords

E Stobert, A Forget, S Chiasson… - Proceedings of the 26th …, 2010 - dl.acm.org
Graphical passwords have been proposed to address known problems with traditional text
passwords. For example, memorable user-chosen text passwords are predictable, but …

A billion keys, but few locks: the crisis of web single sign-on

ST Sun, Y Boshmaf, K Hawkey… - Proceedings of the 2010 …, 2010 - dl.acm.org
OpenID and InfoCard are two mainstream Web single sign-on (SSO) solutions intended for
Internet-scale adoption. While they are technically sound, the business model of these …

[图书][B] User-centric Privacy: A Usable and Provider-independent Privacy Infrastructure

JP Kolter - 2010 - books.google.com
Today's offered services in the World Wide Web increasingly rely on the disclosure of private
user information. Service providers' appetite for personal user data, however, is …

PwdIP-Hash: A lightweight solution to phishing and pharming attacks

B Aslam, L Wu, CC Zou - 2010 Ninth IEEE International …, 2010 - ieeexplore.ieee.org
We present a novel lightweight password-based solution that safeguards users from
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …

[PDF][PDF] The usable security of passwords based on digital objects: From design and analysis to user study

M Mannan, T Whalen, R Biddle… - School of Computer …, 2010 - cs.carleton.ca
Despite all efforts, password schemes intended to deploy or encourage the use of strong
passwords have largely failed. As an interesting alternative to enable users to create …

Enhancing web browsing security

C Yue - 2010 - scholarworks.wm.edu
Web browsing has become an integral part of our lives, and we use browsers to perform
many important activities almost everyday and everywhere. However, due to the …

System security, platform security and usability

PC van Oorschot - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
Scalable trusted computing seeks to apply and extend the fundamental technologies of
trusted computing to large-scale systems. To provide the functionality demanded by users …

[PDF][PDF] PwdIP-Hash

B Aslam, L Wu, CC Zou - cs.ucf.edu
We present a novel lightweight password-based solution that safeguards users from
Phishing and Pharming attacks. The proposed authentication relies on a hashed password …

Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi [Master Thesis]

M Yücel - 2010 - gcris.etu.edu.tr
Kullanıcı adı ve şifre kullanarak kimlik kanıtlama güvenli erişim gerektiren uygulamalar için
çok yaygın olarak kullanılan bir yöntemdir. Kullanıcıların çok kolay tahmin edilebilen şifreler …