• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 47
Next 10 →

CAPTCHA, CAPTCHA Security, CAPTCHA Usability

by M. Tariq B, Ay A, Nisar A. Shah A, Captcha Clickable , 2009
"... The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (C ..."
Abstract - Add to MetaCart
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart

CAPTCHA Usability

by M. Tariq B, Ay A, Nisar A. Shah A, Captcha Clickable , 2009
"... The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (C ..."
Abstract - Add to MetaCart
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the ”user ” is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart

ABSTRACT Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings

by Maritza L. Johnson, Maritza L. Johnson , 2012
"... Many protection mechanisms in computer security are designed to enforce a configurable policy. The security policy captures high-level goals and intentions, and is managed by a policy author tasked with translating these goals into an implementable policy. In our work, we focus on access control pol ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
the desired policy into the implemented policy. Specifying correct security policies is known to be a difficult task, and prior work has contributed policy authoring tools that are more usable than the prior art and other work has also shown the importance of the policy author being able to quickly understand

GEO-RBAC: A spatially aware RBAC

by Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca - In ACM Symposium on Access Control Models and Technologies (SACMAT’06 , 2005
"... Securing access to data in location-based services and mobile applications requires the definition of spatially aware access control systems. Even if some approaches have already been proposed either in the context of geographic database systems or context-aware applications, a comprehensive framewo ..."
Abstract - Cited by 98 (15 self) - Add to MetaCart
the feature (the road, the town, the region) in which they are located. To make the model more flexible and re-usable, we also introduce the concept of role schema, specifying the name of the role as well as the type of the role spatial boundary and the granularity of the logical position. We then extend GEO

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Rührmair: Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. Cryptology ePrint Archive, Report 2012/228

by Marten Van Dijk, Ulrich Rührmair , 2012
"... We investigate the power of physical unclonable functions (PUFs) as a new primitive in cryptographic protocols. Our contributions split into three parts. Firstly, we focus on the realizability of PUF-protocols in a special type of stand-alone setting (the “stand-alone, good PUF setting”) under minim ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
attack models, the so-called posterior access model (PAM) and the bad PUF model, and prove several impossibility results in these models. First, OT and KE protocols whose security is solely based on PUFs are generally impossible in the PAM. More precisely, one-time access of an adversary to the PUF after

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

Usability and Acceptance of UF-IBA, an Image-Based Authentication System Copyright Material IEEE Paper No. ICCST-2007-xxxx

by Piyush Harsh, Richard E. Newman
"... Abstract – Text-based username-password systems have been traditionally used in authenticating users before allowing them access to online services. Psychological studies [1] have shown users ’ inability to recall random sequences of alpha-numeric strings, which theoretically make the best passwords ..."
Abstract - Add to MetaCart
by the researchers regarding user acceptance, and suggests how to make such IBA systems more usable. This paper further provides key usability insights gained from analyzing the log files of users using the system over a period of more than two semesters. Index Terms — user authentication, image-based authentication

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

Access Control A User-Activity-Centric Framework for Access Control in Online Social Networks

by Jaehong Park , Ravi Sandhu , Yuan Cheng
"... Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these individual choices into specific access ..."
Abstract - Add to MetaCart
Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these individual choices into specific
Next 10 →
Results 1 - 10 of 47
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University