Zobrazeno 1 - 10
of 55
pro vyhledávání: '"P. C. van Oorschot"'
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643211
Financial Cryptography (1)
Financial Cryptography (1)
While email is the most ubiquitous and interoperable form of online communication today, it was not conceived with strong security guarantees, and the ensuing security enhancements are, by contrast, lacking in both ubiquity and interoperability. This
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f2a6d7802199be21edee803c0025d290
https://doi.org/10.1007/978-3-662-64322-8_18
https://doi.org/10.1007/978-3-662-64322-8_18
Autor:
P. C. van Oorschot, Cormac Herley
Publikováno v:
IEEE Security & Privacy. 16:12-22
What would a “Science of Security” look like? This question has received considerable attention over the past 10 years. No one argues against the desirability of making security research more “scientific.” But how would one would go about tha
Autor:
AbdelRahman Abdou, P. C. van Oorschot
Publikováno v:
ACM Transactions on Privacy and Security. 21:1-26
We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication by enabling browsers to automatically interpret server location information. We describe the design of this new m
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 14:130-144
The number of location-aware services over the Internet continues growing. Some of these require the client’s geographic location for security-sensitive applications. Examples include location-aware authentication, location-aware access policies, f
Autor:
P. C. van Oorschot, Cormac Herley
Publikováno v:
IEEE Symposium on Security and Privacy
The past ten years has seen increasing calls to makesecurity research more "scientific".On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on
Autor:
P. C. van Oorschot, Furkan Alaca
Publikováno v:
ACSAC
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting but in the specific context of use for augmenting authentication, providing a state-of-the-art view and analysis. We summarize and classify 29 available metho
Publikováno v:
ACM Computing Surveys. 44:1-41
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. We provide a comprehensive overview of published research in the area, covering both usability and security aspect
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 9:222-235
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authenticatio
Autor:
Glenn Wurster, P. C. van Oorschot
Publikováno v:
IEEE Transactions on Software Engineering. 38:191-204
We consider the problem of malicious modification of digital objects. We present a protection mechanism designed to protect against unauthorized replacement or modification of digital objects while still allowing authorized updates transparently. We
Autor:
P. C. van Oorschot, Cormac Herley
Publikováno v:
IEEE Security & Privacy Magazine. 10:28-36
Despite countless attempts and near-universal desire to replace them, passwords are more widely used and firmly entrenched than ever. The authors' exploration leads them to argue that no silver bullet will meet all requirements-not only will password