• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,564
Next 10 →

Password Managers: Attacks and Defenses

by David Silver, Suman Jana, Eric Chen, Collin Jackson, Dan Boneh
"... We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party managers. We observe significant differences in autofill policies among password managers. Several a ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party managers. We observe significant differences in autofill policies among password managers. Several

Tapas: Design, Implementation, and Usability Evaluation of a Password Manager

by Daniel Mccarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. Oorschot
"... Passwords continue to prevail on the web as the primary method for user authentication despite their well-known security and usability drawbacks. Password managers offer some improvement without requiring server-side changes. In this paper, we evaluate the security of dual-possession authentication, ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
configurations of Firefox’s built-in password manager. We found users significantly preferred Tapas. We then improve Tapas by incorporating feedback from this study, and reevaluate it with an additional 10 participants.

Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices

by Eugene Shih, Paramvir Bahl, Michael J. Sinclair - in ACM MobiCom 2002 , 2002
"... The demand for an all-in-one phone with integrated personal information management and data access capabilities is beginning to accelerate. While personal digital assistants (PDAs) with built-in cellular, WiFi, and Voice-Over-IP technologies have the ability to serve these needs in a single package, ..."
Abstract - Cited by 289 (7 self) - Add to MetaCart
The demand for an all-in-one phone with integrated personal information management and data access capabilities is beginning to accelerate. While personal digital assistants (PDAs) with built-in cellular, WiFi, and Voice-Over-IP technologies have the ability to serve these needs in a single package

Kamouflage: Loss-Resistant Password Management

by Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh
"... Abstract. We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry out a considerable amount of online work before obtaining any user credentials. We implement ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
implemented our proposal as a replacement for the built-in Firefox password manager, and provide performance measurements and the results from experiments with large real-world password sets to evaluate the feasibility and effectiveness of our approach. Kamouflage is well suited to become a standard

Python Standard Library / Built-ins

by Drew Flater Nobbir Ahmed, In Arcgis, Scripting Language Of Arcgis
"... Automate map management & production ..."
Abstract - Add to MetaCart
Automate map management & production

Password

by unknown authors
"... based login As an introduction to security and cryptography, let us look at something we do extensively, namely to authenticate ourselves using passwords. We consider a computer on which many different people have accounts. Each of these people has an associated user name. For example, we might have ..."
Abstract - Add to MetaCart
based login As an introduction to security and cryptography, let us look at something we do extensively, namely to authenticate ourselves using passwords. We consider a computer on which many different people have accounts. Each of these people has an associated user name. For example, we might

Separating key management from file system security

by David Mazieres, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel , 1999
"... No secure network file system has ever grown to span the In-ternet. Existing systems all lack adequate key management for security at a global scale. Given the diversity of the In-ternet, any particular mechanism a file system employs to manage keys will fail to support many types of use. We propose ..."
Abstract - Cited by 229 (28 self) - Add to MetaCart
-certifying pathnames, people can bootstrap one key management mechanism using another. These prop-erties make SFS more versatile than any file system with built-in key management.

Password Management Strategies for Online Accounts

by Shirley Gaw - Proc. SOUPS 2006, ACM Press , 2006
"... Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability; compromising one password can help an attac ..."
Abstract - Cited by 89 (0 self) - Add to MetaCart
accumulated more accounts but did not create more passwords. Users justified their habits. While they wanted to protect financial data and personal communication, reusing passwords made passwords easier to manage. Users visualized threats from human attackers, particularly viewing those close to them

Providing Built-in Keyword Search Capabilities in RDBMS

by Guoliang Li, Jianhua Feng, Xiaofang Zhou, Jianyong Wang , 2009
"... Abstract Acommonapproachtoperformingkeywordsearch overrelational databases is to find the minimum Steiner trees in database graphs transformed from relational data. These methods, however, are rather expensive as the minimum Steiner tree problem is known to be NP-hard. Further, these methods are ind ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
and query processing capability. We have implemented our techniques in MYSQL, which can provide built-in keyword-search capabilities using SQL. The experimental results show a significant improvement in both search efficiency and result quality comparing to existing state-of-the-art approaches. 1

Scalable Deterministic Logic Built-In Self-Test

by Von Der Fakultät Informatik, Elektrotechnik Und, Valentin Gherman, Mitberichter Prof, Dr. W. Anheier
"... The core-based design style of integrated circuits (ICs) helps to manage the development challenges brought by the ever increasing complexity of integrated systems and the ever tighter time-to-market. Nevertheless, test-related problems are still far away from having a unitary and satisfactory solut ..."
Abstract - Add to MetaCart
solution, especially in the system on a chip (SOC) context. For the test of ICs two reference approaches are available: external testing and built-in self-test (BIST), out of which a variety of hybrid test strategies are obtained by test resource partitioning (TRP). The final goal is to provide
Next 10 →
Results 1 - 10 of 1,564
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University