|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 35 occurrences of 33 keywords
|
|
|
Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Marlene R. Pratto |
Toward a uniform user interface at UNCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services, Bethesda, Maryland, USA, 1989, pp. 175-180, 1989, ACM, 0-89791-330-2. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
89 | Benjamin M. Gross, Elizabeth F. Churchill |
Addressing constraints: multiple usernames task spillage and notions of identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 2393-2398, 2007, ACM, 978-1-59593-642-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
interview study, usernames, collaboration, instant messaging, email, identity, task, identifier |
63 | William P. Murphy III |
EMS: a homegrown identity management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 281-286, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee |
32 | Adam Coates 0003 |
Academic journals' usernames and the threat of fraudulent accounts on social media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Learn. Publ. ![In: Learn. Publ. 35(2), pp. 140-148, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos |
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022., pp. 560-567, 2022, SCITEPRESS, 978-989-758-590-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Önder Çoban |
An Analysis on Identifying Real Names of Users from Usernames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 30th Signal Processing and Communications Applications Conference, SIU 2022, Safranbolu, Turkey, May 15-18, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-5092-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Solomiia Fedushko, Yuriy Syerov, Oleksandr Skybinskyi, Nataliya Shakhovska, Zoryana Kunch |
Efficiency of Using Utility for Usernames Verification in Online Community Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.01718, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
32 | Md. Mahmudur Rahman, Shahadat Hossain, Mimun Barid, Md. Manzurul Hasan |
Inductions of Usernames' Strengths in Reducing Invasions on Social Networking Sites (SNSs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICO ![In: ICO, pp. 331-340, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Peter Saint-Andre, Alexey Melnikov 0001 |
Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8265, pp. 1-26, October 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Yubin Wang, Tingwen Liu, Qingfeng Tan, Jinqiao Shi, Li Guo 0001 |
Identifying Users across Different Sites using Usernames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS ![In: Graph-Based Representation and Reasoning - 22nd International Conference on Conceptual Structures, ICCS 2016, Annecy, France, July 5-7, 2016, Proceedings, pp. 376-385, 2016, Springer, 978-3-319-40984-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Gabriella M. Harari, Lindsay T. Graham, Samuel D. Gosling |
Personality Impressions of World of Warcraft Players Based on Their Avatars and Usernames: Consensus but No Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Gaming Comput. Mediat. Simulations ![In: Int. J. Gaming Comput. Mediat. Simulations 7(1), pp. 58-73, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Peter Saint-Andre, Alexey Melnikov 0001 |
Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7613, pp. 1-27, August 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils |
How Unique and Traceable are Usernames? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1101.5578, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
32 | Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils |
How Unique and Traceable Are Usernames? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETS ![In: Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, pp. 1-17, 2011, Springer, 978-3-642-22262-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Karen M. Cornetto, Kristine L. Nowak |
Utilizing Usernames for Sex Categorization in Computer-Mediated Communication: Examining Perceptions and Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 9(4), pp. 377-387, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Adam Moskowitz |
On Choosing Usernames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 28(4), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
21 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 352-355, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings, pp. 233-245, 2008, Springer, 978-3-540-89334-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 5(5), pp. 28-32, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Ramsbrock, Robin Berthier, Michel Cukier |
Profiling Attacker Behavior Following SSH Compromises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 119-124, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 42, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
21 | Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 |
Using the mobile phone as a security token for unified authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 68, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentcation, mobility |
21 | Nick Bartlow, Bojan Cukic |
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 7-10 November 2006, Raleigh, North Carolina, USA, pp. 117-126, 2006, IEEE Computer Society, 0-7695-2684-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | John P. Watt, Oluwafemi O. Ajayi, Jipu Jiang, Jos Koetsier, Richard O. Sinnott |
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 357-364, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 9(6), pp. 357-367, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
21 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Graphical Passwords: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 463-472, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | David J. Scott, Richard Sharp |
Specifying and Enforcing Application-Level Web Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(4), pp. 771-783, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Application-level Web security, security policy description languages, component-based design |
21 | Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer |
On secure and pseudonymous client-relationships with multiple servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(4), pp. 390-415, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym |
Displaying result #1 - #28 of 28 (100 per page; Change: )
|
|