|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 330 occurrences of 242 keywords
|
|
|
Results
Found 2103 publication records. Showing 2101 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
221 | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings, pp. 532, 2004, Springer, 3-540-24076-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
93 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 9(6), pp. 357-367, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
56 | Paul C. van Oorschot, Stuart G. Stubblebine |
On countering online dictionary attacks with login histories and humans-in-the-loop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 235-258, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mandatory human participation schemes, online dictionary attacks, password protocols, usable security, relay attack |
56 | Ya-Fen Chang, Chin-Chen Chang 0001, Jui-Yi Kuo |
A secure one-time password authentication scheme using smart cards without limiting login times. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 80-90, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, one-time password |
56 | Ching-Te Wang, Chin-Chen Chang 0001, Chu-Hsing Lin |
Using IC Cards to Remotely Login Passwords without Verification Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 321-326, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
discrete logarithms, timestamp, one-way function, Password authentication |
49 | Susan Hohenberger, Stephen A. Weis |
Honest-Verifier Private Disjointness Testing Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 277-294, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login |
49 | Scott E. Hanselman, Luis O. Hernández, Divyangi Anchan, Mahmoud Pegah |
OS X: here we go again. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 221-226, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
login hooks, logout hooks, network, migration, LDAP, NFS, fonts, SSH, Macintosh OS X |
49 | Dianne Brotherson |
Turning the titanic: changing a PIN to a password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 315-318, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PIN numbers, strong passwords, passwords, conversion, password security, login |
47 | Adam Barth, Collin Jackson, John C. Mitchell |
Robust defenses for cross-site request forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 75-88, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery, http referer header, web application firewall, same-origin policy |
47 | Leah Ding, Roberto Corizzo, Colin Bellinger, Nancy Ching, Spencer Login, Rodrigo Yepez-Lopez, Jie Gong, Dong L. Wu |
Imbalanced Multi-layer Cloud Classification with Advanced Baseline Imager (ABI) and CloudSat/CALIPSO Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 5902-5909, 2022, IEEE, 978-1-6654-8045-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
47 | Nikita Login, Alexander Baranov, Pavel Braslavski |
Jokingbird: Funny Headline Generation for News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIST ![In: Analysis of Images, Social Networks and Texts - 10th International Conference, AIST 2021, Tbilisi, Georgia, December 16-18, 2021, Revised Selected Papers, pp. 97-109, 2021, Springer, 978-3-031-16499-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
44 | Jim Basney, Terry Fleury, Von Welch |
Federated login to TeraGrid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 1-11, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GridShib, MyProxy, grid computing, PKI, SAML, identity federation, Shibboleth, TeraGrid |
44 | Daniel E. Riedel, Wanquan Liu, Ronny Tjahyadi |
Correlation Filters for Facial Recognition Login Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (1) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part I, pp. 385-393, 2004, Springer, 3-540-23974-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Yun Su, Mo Xi |
Systematic Solutions to Login and Authentication Security: A Dual-Password Login-Authentication Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01803, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Amir Herzberg, Ronen Margulies |
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 452-471, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
41 | Christopher Rath |
THE BNR Standard Login (A Login Configuration Manager). ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 8th Conference on Systems Administration (LISA 1994), San Diego, California, USA, September 19-23, 1994, 1994, USENIX, 1-880446-64-2. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
37 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
37 | Jerome R. Bellegarda |
Language-Independent Speaker Classification over a Far-Field Microphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speaker Classification (2) ![In: Speaker Classification II, Selected Projects, pp. 104-115, 2007, Springer, 978-3-540-74121-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Spectral matching, global representation, latent structure, desktop voice login, distance metric |
37 | Pei-Chi Wu |
Using Plain Base32 ASCII-Compatible Encoding in the Local Part of E-mail Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January - 1 February 2002, Nara City, Japan, Proceedings, pp. 214-219, 2002, IEEE Computer Society, 0-7695-1447-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internationalized Domain Names (IDN), lexical restrictions, login names, base64, base32 |
35 | Utsav Drolia, Zhenyan Wang, Srinivas Vemuri, Madhur Behl, Rahul Mangharam |
Demo abstract: AutoPlug - An automotive test-bed for ECU testing, validation and verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 131-132, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Paul D. Martin 0001, William Etter, Rahul Mangharam |
Demo abstract: R.A.V.E.N. - Remote autonomous vehicle explorer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 123-124, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Md. Mahbubur Rahman, Amin Ahsan Ali, Andrew Raij, Mustafa al'Absi, Emre Ertin, Santosh Kumar 0001 |
Demo abstract: Online detection of speaking from respiratory measurements collected in the natural environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 137-138, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Carlo Alberto Boano, Matteo Lasagni, Kay Römer, Tanja Lange 0002 |
Poster abstract: Accurate monitoring of circardian rhythms using wearable Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 169-170, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Johannes Schneider 0002, Roger Wattenhofer |
Poster abstract: Three plane localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 147-148, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Claro Noda, Shashi Prabh, Carlo Alberto Boano, Thiemo Voigt, Mário Alves |
Poster abstract: A channel quality metric for interference-aware wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 167-168, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Matthias Keller, Jan Beutel |
Demo abstract: Efficient data retrieval for interactive browsing of large sensor network data sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 139-140, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Wen Hu, Brano Kusy, Christian Richter, Michael Brünig, Cong Huynh |
Demo abstract: Radio-diversity collection tree protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 111-112, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Zhihao Jiang, Miroslav Pajic, Rahul Mangharam |
Demo abstract: Closed-loop testing for implantable cardiac pacemakers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 119-120, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Johannes Schneider 0002, Roger Wattenhofer |
Poster abstract: Message position modulation for power saving and increased bandwidth in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 149-150, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Charalambos Sergiou, Marios Koutroullos, Vasos Vassiliou |
Poster abstract: A congestion mitigation approach using mobile nodes in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 161-162, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Richard Huber, Philipp Sommer, Roger Wattenhofer |
Demo abstract: Debugging wireless sensor network simulations with YETI and COOJA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 141-142, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Mudasser Iqbal, Daiqin Yang, Talha Obaid, Teng Jie Ng, Hock-Beng Lim |
Demo abstract: A service-oriented application programming interface for sensor network virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 143-144, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Bernhard Buchli, Mustafa Yuecel, Roman Lim, Tonio Gsell, Jan Beutel |
Demo abstract: Feature-rich platform for WSN design space exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 115-116, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Vinaitheerthan Sundaram, Patrick Eugster, Xiangyu Zhang 0001 |
Demo abstract: Diagnostic tracing of wireless sensor networks with TinyTracer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 10th International Conference on Information Processing in Sensor Networks, IPSN 2011, April 12-14, 2011, Chicago, IL, USA, pp. 145-146, 2011, IEEE, 978-1-61284-854-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Anthony Schoofs, Alex Sintoni, Gregory M. P. O'Hare, Antonio G. Ruzzelli |
Demo Abstract: Appliance Load Monitoring by Power Load Disaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2010, June 21-25, 2010, Boston, Massachusetts, USA, pp. 1-2, 2010, IEEE, 978-1-4244-7151-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Joakim Eriksson, Fredrik Österlind, Thiemo Voigt, Niclas Finne, Shahid Raza, Nicolas Tsiftes, Adam Dunkels |
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, 12-15 October 2009, Macau (S.A.R.), China, pp. 1060-1061, 2009, IEEE Computer Society, 978-1-4244-5113-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Dinei A. F. Florêncio, Cormac Herley |
One-Time Password Access to Any Server without Changing the Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 401-420, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
replay resistance, authentication, Passwords, one-time passwords |
35 | Jie Liu, Lei Fan 0002, Jianhua Li 0001 |
Cryptanalysis and improvement on Yang-Shieh authentication schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 64, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart cards, information security, remote authentication |
35 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 665-671, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, smart card, password |
33 | David M. Beazley |
;login: The UNIX Newsletter: Volume 2, Number 7, August 1977. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 40(6), 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
33 | Rik Farrow, Jane-Ellen Long |
Writing for ;login;. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 31(5), 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
33 | Peter H. Salus |
20 Years Ago in ;login. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 30(4), 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
33 | Peter H. Salus |
Twenty Years Ago in ;login. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 29(5), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
32 | Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos |
Enhancing Login Security Through the Use of Keystroke Input Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006, Proceedings, pp. 661-667, 2006, Springer, 3-540-31111-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Stuart G. Stubblebine, Paul C. van Oorschot |
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers, pp. 39-53, 2004, Springer, 3-540-22420-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Felix Halim, Yongzheng Wu, Roland H. C. Yap |
Wiki credibility enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Sym. Wikis ![In: Proceedings of the 2009 International Symposium on Wikis, 2009, Orlando, Florida, USA, October 25-27, 2009, 2009, ACM, 978-1-60558-730-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, Wikipedia, credibility, OpenID, login |
25 | A. J. Bernheim Brush, Kori M. Inkpen |
Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 109-126, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
empirical studies, sharing, home, domestic technology, login |
25 | Bert Valenzuela |
Supporting a Windows XP/Red Hat Linux dual boot environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 31st Annual ACM SIGUCCS Conference on User Services 2003, San Antonio, TX, USA, September 21-24, 2003, pp. 196-199, 2003, ACM, 1-58113-665-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
AFS, Arizona State University, GRUB, KDE, Red Hat, academic computing, computer classroom, logout, partition, Linux, Windows, computer lab, build, obstacle, lab management, dual boot, login |
24 | Paul Dunphy, Andreas P. Heiner, N. Asokan |
A closer look at recognition-based graphical passwords on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mobile devices, graphical passwords, shoulder surfing |
24 | James Cheney |
Workshop on theory and practice of provenance event report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 38(2), pp. 57-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Eun-A Jun, Jea Doek Ji, Jongin Lim 0001, Seok Won Jung |
Improved remote user authentication scheme using bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 602-605, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, smart card, bilinear pairings |
24 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 73-80, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
24 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings, pp. 233-245, 2008, Springer, 978-3-540-89334-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Slawomir Grzonkowski, Wojciech Zaremba, Maciej Zaremba, Bill McDaniel |
Extending web applications with a lightweight zero knowledge proof authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 65-70, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
web 2.0 authentication, protocols, web 2.0, password, graph isomorphism, zero knowledge proof |
24 | Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza |
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 559-562, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Chen Yang, Wenping Ma 0002, Xinmei Wang |
Novel Remote User Authentication Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 306-312, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos |
On the Use of Rough Sets for User Authentication Via Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA Workshops ![In: Progress in Artificial Intelligence, 13th Portuguese Conference on Aritficial Intelligence, EPIA 2007, Workshops: GAIW, AIASTS, ALEA, AMITA, BAOSW, BI, CMBSB, IROBOT, MASTA, STCS, and TEMA, Guimarães, Portugal, December 3-7, 2007, Proceedings, pp. 145-159, 2007, Springer, 978-3-540-77000-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behavioral biometrics, rough sets, reducts, multiple sequence alignment, keystroke dynamics |
24 | Joshua Staley, Suresh Muknahallipatna, Howard Johnson |
Fibre Channel based Storage Area Network Modeling using OPNET for Large Fabric Simulations: Preliminary Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 234-236, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FC-2 level, Simulator, Modeling, Scaling, Switch, Fabric, Fibre Channel |
24 | Kevin Tham, Mark Looi, Ernest Foo |
Ubiquitous Authorization Scheme Based on Device Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 312-321, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Vassilis Poursalidis, Christos Nikolaou |
A New User-Centric Identity Management Infrastructure for Federated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 11-20, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Christina Brodersen, Bent Guldbjerg Christensen, Kaj Grønbæk, Christian Dindler, Balasuthas Sundararajah |
eBag: a ubiquitous Web infrastructure for nomadic learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 298-306, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
HyCon, eBag, adaptive, context-aware, XLink, WebDAV |
24 | Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han |
The N/R One Time Password System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 733-738, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Alexander Binun, Ehud Gudes |
Policy and State Based Secure Wrapper and Its Application to Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LA-WEB ![In: 1st Latin American Web Congress (LA-WEB 2003), Empowering Our Web, 10-12 November 2003, Sanitago, Chile, pp. 14-26, 2003, IEEE Computer Society, 0-7695-2058-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
state-based fine-grained authorization, Security, mobile agents |
24 | Bert Valenzuela |
Is a modern, robust Windows XP lab environment better than an older, simpler Windows NT4 environment? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 294-297, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
AFS, Arizona State University, PC-Rdist, Windows NT4, default user profile, group policy, kix32, lab configuration, logon time, mandatory profile, site configuration, system policy, script, Windows, build, kerberos, lab management, active directory, Windows 2000, Windows XP |
24 | Mason J. Katz, Philip M. Papadopoulos, Greg Bruno |
Leveraging Standard Core Technologies to Programmatically Build Linux Cluster Appliances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2002 IEEE International Conference on Cluster Computing (CLUSTER 2002), 23-26 September 2002, Chicago, IL, USA, pp. 47-53, 2002, IEEE Computer Society, 0-7695-1745-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Guijun Wang, Richard Robinson |
An Architecture for Web-Enabled Engineering Applications Based on Lightweight High Performance CORBA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 17-20 September 2002, Lausanne, Switzerland, Proceedings, pp. 249-257, 2002, IEEE Computer Society, 0-7695-1742-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Woei-Jiunn Tsaur |
A Flexible User Authentication Scheme for Multi-server Internet Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 1, pp. 174-183, 2001, Springer, 3-540-42302-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet, Smart card, Password authentication, Communications security, Lagrange interpolating polynomial |
24 | David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong |
Java Security Extensions for a Java Server in a Hostile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 64-73, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Daniele Gunetti, Giancarlo Ruffo |
Intrusion Detection through Behavioral Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDA ![In: Advances in Intelligent Data Analysis, Third International Symposium, IDA-99, Amsterdam, The Netherlands, August 1999, Proceedings, pp. 383-394, 1999, Springer, 3-540-66332-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Aït-Kaci, Roger Nasr |
Logic and Inheritance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Conference Record of the Thirteenth Annual ACM Symposium on Principles of Programming Languages, St. Petersburg Beach, Florida, USA, January 1986, pp. 219-228, 1986, ACM Press. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
24 | Richard S. Marcus |
Integration through intermediary system networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 13th ACM Annual Conference on Computer Science, New Orleans, Louisiana, USA, 1985, pp. 33, 1985, ACM, 0-89791-150-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
21 | Ayush Dosaj, Suresh Chandra Satapathy, Rajkumar Soundrapandiyan, Mannat Kaur, Naeem Hannoon |
An efficient cloud based face recognition system for e-health secured login using steerable pyramid transform and local directional pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(1), pp. 1017-1027, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Ignacio Astaburuaga |
User Study: Comparison of Picture Passwords and Current Login Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.09654, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | M. I. Mary Metilda, D. Lalitha, S. Vaithyasubramanian |
Data security-web login authentication process using password generating tile array token interval timed coloured Petri nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 24(2), pp. 134-143, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot |
Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.13074, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières |
Accountable authentication with privacy protection: The Larch system for universal login. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.19241, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu |
Detecting compromised email accounts via login behavior characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 6(1), pp. 36, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Suood Abdulaziz Al-Roomi, Frank Li 0001 |
A Large-Scale Measurement of Website Login Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2061-2078, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Weiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu |
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023, pp. 1274-1279, 2023, IEEE, 979-8-3503-0048-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières |
Accountable authentication with privacy protection: The Larch system for universal login. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSDI ![In: 17th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2023, Boston, MA, USA, July 10-12, 2023., pp. 81-98, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Qiaodan He, Luna Zhang, Dawei Zhang, Yuliang Yao |
Does Pre-login Search Matter? Evidence from a Mobile Commerce Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 5751-5760, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Andreas Grüner, Alexander Mühle, Nils Rümmler, Adnan Kadric, Christoph Meinel |
Quo Vadis, Web Authentication? - An Empirical Analysis of Login Methods on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (3) ![In: Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 3, pp. 471-479, 2023, Springer, 978-3-031-28693-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Manuel Sánchez-Paniagua, Eduardo Fidalgo Fernandez, Enrique Alegre, Mhd Wesam Al Nabki, Víctor González-Castro |
Phishing URL Detection: A Real-Case Scenario Through Login URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 42949-42960, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sean R. Wilkinson, Ketan Maheshwari, Rafael Ferreira da Silva |
Unveiling User Behavior on Summit Login Nodes as a User. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.08354, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Philipp Markert, Leona Lassak, Maximilian Golla, Markus Dürmuth |
"I Knew It Was Me": Understanding Users' Interaction with Login Notifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.07316, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Bhaveer Bhana, Stephen V. Flowerday |
Usability of the login authentication process: passphrases and passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 30(2), pp. 280-305, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Elham Arshad, Michele Benolli, Bruno Crispo |
Practical attacks on Login CSRF in OAuth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 121, pp. 102859, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Ruimin Wang, Haitao Li, Jing Jing, Liehui Jiang, Weiyu Dong |
WYSIWYG: IoT Device Identification Based on WebUI Login Pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(13), pp. 4892, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Minami Yoda, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga |
Detection of Plaintext Login Information in Firmware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2022, Taipei, Taiwan, July 6-8, 2022, pp. 523-524, 2022, IEEE, 978-1-6654-7050-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Brett Eiffert, Chen Zhang |
Usage Pattern Analysis for the Summit Login Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Accelerating Science and Engineering Discoveries Through Integrated Research Infrastructure for Experiment, Big Data, Modeling and Simulation - 22nd Smoky Mountains Computational Sciences and Engineering Conference, SMC 2022, Virtual Event, August 23-25, 2022, Revised Selected Papers, pp. 329-344, 2022, Springer, 978-3-031-23605-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela |
CAPTCHA-based Login Scheme in Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE (2) ![In: ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8 - 13, 2022, Volume 2, pp. 615, 2022, ACM, 978-1-4503-9200-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sean R. Wilkinson, Ketan Maheshwari, Rafael Ferreira da Silva |
Unveiling User Behavior on Summit Login Nodes as a User. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (1) ![In: Computational Science - ICCS 2022 - 22nd International Conference, London, UK, June 21-23, 2022, Proceedings, Part I, pp. 516-529, 2022, Springer, 978-3-031-08750-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Martin Zboril, Jana Syrovátková, Antonín Pavlícek |
Social Login Usage for Third-Party Cloud Services - Relation of Security Risks and Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNAMS ![In: Ninth International Conference on Social Networks Analysis, Management and Security, SNAMS 2022, Milan, Italy, November 29 - Dec. 1, 2022, pp. 1-8, 2022, IEEE, 979-8-3503-2048-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Minami Yoda, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga |
Detecting Hardcoded Login Information from User Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2022, Las Vegas, NV, USA, January 7-9, 2022, pp. 1-2, 2022, IEEE, 978-1-6654-4154-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yang Li 0103, Xinyu Yun, Liming Fang 0001, Chunpeng Ge |
An Efficient Login Authentication System against Multiple Attacks in Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(1), pp. 125, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wenna Song, Jiang Ming 0002, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng |
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.03511, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Varun Mandalapu, Lujie Chen, Zhiyuan Chen, Jiaqi Gong |
Student-centric Model of Login Patterns: A Case Study with Learning Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDM ![In: Proceedings of the 14th International Conference on Educational Data Mining, EDM 2021, virtual, June 29 - July 2, 2021., 2021, International Educational Data Mining Society. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Carlos Villarán, Marta Beltrán |
Protecting End User's Privacy When using Social Login through GDPR Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 428-435, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yanna Wu, Fucheng Liu, Yu Wen |
Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics XVII - 17th IFIP WG 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers, pp. 157-173, 2021, Springer, 978-3-030-88380-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha |
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021, pp. 71-87, 2021, IEEE, 978-1-6654-1491-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2101 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|