Zobrazeno 1 - 10
of 467
pro vyhledávání: '"Camp, L A"'
Autor:
Mankoff, Jennifer, Kasnitz, Devva, Studies, Disability, Camp, L Jean, Lazar, Jonathan, Hochheiser, Harry
This response to the RFI considers the potential for biometrics to help or harm disabled people2. Biometrics are already integrated into many aspects of daily life, from airport travel to mobile phone use. Yet many of these systems are not accessible
Externí odkaz:
http://arxiv.org/abs/2208.04712
Publikováno v:
In International Symposium on Human Aspects of Information Security and Assurance (pp. 127-137). Springer, Cham (2021)
Secure installation of Internet of Things (IoT) devices requires configuring access control correctly for each device. In order to enable correct configuration the Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task F
Externí odkaz:
http://arxiv.org/abs/2112.02412
Manufacturer Usage Description (MUD) is an Internet Engineering Task Force (IETF) standard designed to protect IoT devices and networks by creating an out-of-the-box access control list for an IoT device. %The protocol defines a conceptually straight
Externí odkaz:
http://arxiv.org/abs/2107.06372
Autor:
Das, Sanchari, Gutzwiller, Robert S., Roscoe, Rod D., Rajivan, Prashanth, Wang, Yang, Camp, L. Jean, Hoyle, Roberto
Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious th
Externí odkaz:
http://arxiv.org/abs/2101.07377
Publikováno v:
Communications of the ACM; Dec2024, Vol. 67 Issue 12, p40-42, 3p
Spear phishing is a deceptive attack that uses social engineering to obtain confidential information through targeted victimization. It is distinguished by its use of social cues and personalized information to target specific victims. Previous work
Externí odkaz:
http://arxiv.org/abs/2006.16380
In the age of ubiquitous technologies, security- and privacy-focused choices have turned out to be a significant concern for individuals and organizations. Risks of such pervasive technologies are extensive and often misaligned with user risk percept
Externí odkaz:
http://arxiv.org/abs/2006.09531
Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security by providing additional verification steps. However, in p
Externí odkaz:
http://arxiv.org/abs/1908.05902
Security vulnerabilities of traditional single factor authentication has become a major concern for security practitioners and researchers. To mitigate single point failures, new and technologically advanced Multi-Factor Authentication (MFA) tools ha
Externí odkaz:
http://arxiv.org/abs/1908.05901
Publikováno v:
Comput. Netw. vol. 188, pp. 107835, 2021
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend
Externí odkaz:
http://arxiv.org/abs/1905.05835