Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Simko, Lucy"'
Autor:
Amft, Sabrina, Höltervennhoff, Sandra, Huaman, Nicolas, Krause, Alexander, Simko, Lucy, Acar, Yasemin, Fahl, Sascha
Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with
Externí odkaz:
http://arxiv.org/abs/2306.09708
Autor:
Simko, Lucy, Chang, Jack Lucas, Jiang, Maggie, Calo, Ryan, Roesner, Franziska, Kohno, Tadayoshi
There is growing use of technology-enabled contact tracing, the process of identifying potentially infected COVID-19 patients by notifying all recent contacts of an infected person. Governments, technology companies, and research groups alike have be
Externí odkaz:
http://arxiv.org/abs/2012.01553
There is growing interest in technology-enabled contact tracing, the process of identifying potentially infected COVID-19 patients by notifying all recent contacts of an infected person. Governments, technology companies, and research groups alike re
Externí odkaz:
http://arxiv.org/abs/2005.06056
Autor:
Akers, John, Bansal, Gagan, Cadamuro, Gabriel, Chen, Christine, Chen, Quanze, Lin, Lucy, Mulcaire, Phoebe, Nandakumar, Rajalakshmi, Rockett, Matthew, Simko, Lucy, Toman, John, Wu, Tongshuang, Zeng, Eric, Zorn, Bill, Roesner, Franziska
Technology is increasingly used -- unintentionally (misinformation) or intentionally (disinformation) -- to spread false information at scale, with potentially broad-reaching societal effects. For example, technology enables increasingly realistic fa
Externí odkaz:
http://arxiv.org/abs/1812.09383
Autor:
Amft, Sabrina, Höltervennhoff, Sandra, Huaman, Nicolas, Krause, Alexander, Simko, Lucy, Acar, Yasemin, Fahl, Sascha
Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1013bab06425a6e9e8492652f99e9e7a
http://arxiv.org/abs/2306.09708
http://arxiv.org/abs/2306.09708
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Digital Threats: Research & Practice; Sep2022, Vol. 3 Issue 3, p1-36, 36p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Simko, Lucy
Publikováno v:
American Bicyclist; Sep/Oct2007, p11-11, 1p