• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 31
Next 10 →

Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys

by Stefan Lucks - Proc. of the Security Protocols Workshop, LNCS 1361 , 1997
"... . Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed "encrypted key exchange" (EKE) protocols, to frustrate keyguessing attack ..."
Abstract - Cited by 67 (0 self) - Add to MetaCart
. Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed "encrypted key exchange" (EKE) protocols, to frustrate keyguessing

How to Defeat Dictionary Attacks Without Encrypting Public Keys

by Stefan Lucks - Proc. of the Security Protocols Workshop, LNCS 1361 , 1997
"... . Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed "encrypted key exchange" (EKE) protocols, to frustrate keyguessing attack ..."
Abstract - Add to MetaCart
. Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed "encrypted key exchange" (EKE) protocols, to frustrate keyguessing

Technologies to Defeat Fraudulent Schemes Related to Email Requests

by Edoardo Airoldi, Bradley Malin, Latanya Sweeney
"... Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electronic form. Increasingly, such schemes target an individual's personal e-mail, where they mingle among, and are masked by, honest communications. The targeting and conniving nature of these scheme ..."
Abstract - Add to MetaCart
of these schemes are an infringement upon an individual's personal privacy, as well as a threat to personal safety. We argue that state-of-the-art spam filtering systems fail to capture fraudulent intent hidden in the text of e-mails, but demonstrate how more robust systems can be engineered starting from

AI Technologies to Defeat Identity Theft Vulnerabilities

by Latanya Sweeney - AAAI Spring Symposium, AI Technologies for Homeland Security , 2005
"... When a large number of citizens are at risk to identity theft, national security and economic prosperity are threatened. This work shows that thousands of Americans are at such risk, and introduces technology, named “Identity Angel, ” to help. Identity Angel’s goal is to crawl through information av ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
how resumes containing needed information can automatically be found and values harvested, and how many subjects removed such information from the Web once notified. Incidents among younger adults were high. These adults are more likely to have resumes and facts about themselves posted on the World

E. Airoldi, B. Malin, and L. Sweeney. Technologies to Defeat Fraudulent Schemes Related to Email Requests. AAAI Spring Symposium on AI Technologies for Homeland Security, 2005. Technologies to Defeat Fraudulent Schemes Related to Email Requests

by Edoardo Airoldi, Bradley Malin, Latanya Sweeney
"... Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electronic form. Increasingly, such schemes target an individual's personal e-mail, where they mingle among, and are masked by, honest communications. The targeting and conniving nature of these scheme ..."
Abstract - Add to MetaCart
of these schemes are an infringement upon an individual's personal privacy, as well as a threat to personal safety. We argue that state-of-the-art spam filtering systems fail to capture fraudulent intent hidden in the text of e-mails, but demonstrate how more robust systems can be engineered starting from

Sizing up the threat: The envisioned physical formidability of terrorists tracks their leaders’ failures and successes.

by Colin Holbrook , Daniel M T Fessler - Cognition, , 2013
"... a b s t r a c t Victory in modern intergroup conflict derives from complex factors, including weaponry, economic resources, tactical outcomes, and leadership. We hypothesize that the mind summarizes such factors into simple metaphorical representations of physical size and strength, concrete dimens ..."
Abstract - Cited by 9 (6 self) - Add to MetaCart
approximately a year later (Study 2), Americans for whom the killing was salient estimated a purported Islamic terrorist to be physically smaller/weaker. In Studies 3 and 4, primes of victorious terrorist leaders led to inflated estimates of terrorists' physical attributes. These findings elucidate how

L. Sweeney. AI Technologies to Defeat Identity Theft Vulnerabilities. AAAI Spring Symposium on AI Technologies for Homeland Security, 2005. AI Technologies to Defeat Identity Theft Vulnerabilities

by Latanya Sweeney
"... When a large number of citizens are at risk to identity theft, national security and economic prosperity are threatened. This work shows that thousands of Americans are at such risk, and introduces technology, named “Identity Angel, ” to help. Identity Angel’s goal is to crawl through information av ..."
Abstract - Add to MetaCart
how resumes containing needed information can automatically be found and values harvested, and how many subjects removed such information from the Web once notified. Incidents among younger adults were high. These adults are more likely to have resumes and facts about themselves posted on the World

Articles Enough! Electoral Fraud, Collective Action Problems, and Post-Communist Colored Revolutions

by Joshua A. Tucker
"... In countries where citizens have strong grievances against the regime, attempts to address these grievances in the course of daily life are likely to entail high costs coupled with very low chances of success in any meaningful sense; consequently, most citizens will choose not to challenge the regim ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
the regime, thus reflecting the now well-known collective action problem. When a regime commits electoral fraud, however, an individual’s calculus regarding whether to participate in a protest against the regime can be changed significantly. This argument yields important implications for how we interpret

Click Fraud Detection: Adversarial Pattern Recognition over 5 Years at Microsoft

by Brendan Kitts , Jing Ying Zhang , Gang Wu , Wesley Brandi , Julien Beasley , Kieran Morrill , John Ettedgui , Sid Siddhartha , Hong Yuan , Feng Gao , Peter Azo , Raj Mahato
"... Abstract. Microsoft adCenter is the third largest Search advertising platform in the United States behind Google and Yahoo, and services about 10% of US traffic. At this scale of traffic approximately 1 billion events per hour, amounting to $2.3 billion ad dollars annually, need to be scored to det ..."
Abstract - Add to MetaCart
them. In designing the filtration system, we intentionally chose a rules representation. Rules have a number of advantages for large-scale fraud detection: Every filtration decision has a reason. Every rule can be identified with a ruleID. When the rule fires, the model outcome (eg. filter / don

Location Verification using Secure Distance Bounding Protocols

by Dave Singelee, Bart Preneel - IEEE Computer Society
"... Abstract—Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad–hoc networks, location in-formation can also be used to authenticate devices and us ..."
Abstract - Cited by 36 (2 self) - Add to MetaCart
and users. We will focus on how a prover can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so– called “terrorist fraud attack”. In this paper, we
Next 10 →
Results 1 - 10 of 31
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University