Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Rachna Dhamija"'
Autor:
Rachna Dhamija, Sven Dietrich
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783540773658
Erratum to: S. Dietrich and R. Dhamija (Eds.) Financial Cryptography and Data Security DOI: 10.1007/978-3-540-77366-5
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e4a152c17b5ca89cd64a17210cd914c8
https://doi.org/10.1007/978-3-540-77366-5_37
https://doi.org/10.1007/978-3-540-77366-5_37
Autor:
Rachna Dhamija, L. Dusseault
Publikováno v:
IEEE Security & Privacy Magazine. 6:24-29
Web identity management systems are complex systems with powerful features - and many potential vulnerabilities. They aim to facilitate the management of identifiers, credentials, personal information, and the presentation of this information to othe
Publikováno v:
Communications of the ACM. 42:50-55
Publikováno v:
SOUPS
In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded ver
Publikováno v:
IEEE Symposium on Security and Privacy
We evaluate Website authentication measures that are designed to protect users from man-in-the-middle, 'phishing', and other site forgery attacks. We asked 67 bank customers to conduct common online banking tasks. Each time they logged in, we present
Autor:
Rachna Dhamija
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783540773658
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3db0b4d2cfa97f9ad54ef54d287accc
https://doi.org/10.1007/978-3-540-77366-5_26
https://doi.org/10.1007/978-3-540-77366-5_26
Publikováno v:
CHI
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are successful at deceiving genera
Publikováno v:
INFOVIS
We describe a new animation technique for supporting interactive exploration of a graph. We use the well-known radial tree layout method, in which the view is determined by the selection of a focus node. Our main contribution is a method for animatin
Autor:
David Thaw, Nathaniel Good, Jens Grossklags, Steven Aronowitz, Deirdre K. Mulligan, Rachna Dhamija, Joseph A. Konstan
Publikováno v:
SOUPS
Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other t
Autor:
J. D. Tygar, Rachna Dhamija
Publikováno v:
SOUPS
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users.We propose a new scheme, Dynamic Security Skins, that allows