Results 1 - 10
of
47
CAPTCHA, CAPTCHA Security, CAPTCHA Usability
, 2009
"... The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (C ..."
Abstract
- Add to MetaCart
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart
CAPTCHA Usability
, 2009
"... The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (C ..."
Abstract
- Add to MetaCart
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart
ABSTRACT Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings
, 2012
"... Many protection mechanisms in computer security are designed to enforce a configurable policy. The security policy captures high-level goals and intentions, and is managed by a policy author tasked with translating these goals into an implementable policy. In our work, we focus on access control pol ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
the desired policy into the implemented policy. Specifying correct security policies is known to be a difficult task, and prior work has contributed policy authoring tools that are more usable than the prior art and other work has also shown the importance of the policy author being able to quickly understand
GEO-RBAC: A spatially aware RBAC
- In ACM Symposium on Access Control Models and Technologies (SACMAT’06
, 2005
"... Securing access to data in location-based services and mobile applications requires the definition of spatially aware access control systems. Even if some approaches have already been proposed either in the context of geographic database systems or context-aware applications, a comprehensive framewo ..."
Abstract
-
Cited by 98 (15 self)
- Add to MetaCart
the feature (the road, the town, the region) in which they are located. To make the model more flexible and re-usable, we also introduce the concept of role schema, specifying the name of the role as well as the type of the role spatial boundary and the granularity of the logical position. We then extend GEO
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Rührmair: Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. Cryptology ePrint Archive, Report 2012/228
, 2012
"... We investigate the power of physical unclonable functions (PUFs) as a new primitive in cryptographic protocols. Our contributions split into three parts. Firstly, we focus on the realizability of PUF-protocols in a special type of stand-alone setting (the “stand-alone, good PUF setting”) under minim ..."
Abstract
-
Cited by 10 (2 self)
- Add to MetaCart
attack models, the so-called posterior access model (PAM) and the bad PUF model, and prove several impossibility results in these models. First, OT and KE protocols whose security is solely based on PUFs are generally impossible in the PAM. More precisely, one-time access of an adversary to the PUF after
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law
Usability and Acceptance of UF-IBA, an Image-Based Authentication System Copyright Material IEEE Paper No. ICCST-2007-xxxx
"... Abstract – Text-based username-password systems have been traditionally used in authenticating users before allowing them access to online services. Psychological studies [1] have shown users ’ inability to recall random sequences of alpha-numeric strings, which theoretically make the best passwords ..."
Abstract
- Add to MetaCart
by the researchers regarding user acceptance, and suggests how to make such IBA systems more usable. This paper further provides key usability insights gained from analyzing the log files of users using the system over a period of more than two semesters. Index Terms — user authentication, image-based authentication
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Access Control A User-Activity-Centric Framework for Access Control in Online Social Networks
"... Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these individual choices into specific access ..."
Abstract
- Add to MetaCart
Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these individual choices into specific
Results 1 - 10
of
47