Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Authentication (D.4.6...)  
 
Options:
 
  1-10 of 18 Reviews about "Authentication (D.4.6...)": Date Reviewed
   An introduction to data: everything you need to know about AI, big data and data science
Corea F., Springer International Publishing, New York, NY, 2019. 131 pp.  Type: Book (978-3-030044-67-1)

Are you an early practitioner, researcher, business/experience executive, or entrepreneur who uses artificial intelligence (AI), big data, and data sciences in financial services, private investment, or related sectors? This book will ...

Feb 5 2020
  Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016.  Type: Article

Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...

Jun 27 2017
  Privacy preserved attribute aggregation to avoid correlation of user activities across Shibboleth SPs
Nakamura M., Nishimura T., Yamaji K., Sato H., Okabe Y.  COMPSACW 2013 (Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, Kyoto, Japan, Jul 22-26, 2013) 367-372, 2013.  Type: Proceedings

Have you ever encountered a problem where you thought you had to dig a tunnel through the hard way, but then saw you can instead fly around it?...

Jun 11 2014
  Secure and usable authentication on mobile devices
Schlöglhofer R., Sametinger J.  MoMM 2012 (Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, Dec 3-5, 2012) 257-262, 2012.  Type: Proceedings

SecureLock, an authentication mechanism for Android-based devices, is proposed and compared with existing solutions in this paper. It is a replacement for the Android lock screen and provides four methods of authentication: PIN, passwo...

Mar 15 2013
   Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L.  SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012.  Type: Proceedings

This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...

Nov 21 2012
  What makes users refuse Web single sign-on?: An empirical investigation of OpenID
Sun S., Pospisil E., Muslukhov I., Dindar N., Hawkey K., Beznosov K.  SOUPS 2011 (Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, Jul 20-22, 2011) 1-20, 2011.  Type: Proceedings

The authors pose a very pertinent question: Why do users reject OpenID, a Web single sign-on (SSO)? As a user who rejects OpenID SSO, I am prompted to ask why users would want to deploy this method in the first place?...

May 25 2012
   Public key superstructure: "It’s PKI Jim, but not as we know it!"
Wilson S.  Identity and trust on the Internet (Proceedings of the 7th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryland, Mar 4-6, 2008) 72-88, 2008.  Type: Proceedings

Why is it so hard to make global public key infrastructure (PKI) work? Not only does Wilson excellently question the misleading assumptions pertaining to the apparent failure of universal open PKI, but he also lucidly presents a viable...

Sep 2 2008
  Watermarking, tamper-proffing, and obfuscation: tools for software protection
Collberg C., Thomborson C. IEEE Transactions on Software Engineering 28(8): 735-746, 2002.  Type: Article

Software piracy, reverse engineering, and tampering are the problems; watermarking, obfuscation, and tamper-proofing are the answers. Protecting software running in a malicious computer is the objective....

May 27 2003
  Authentication metric analysis and design
Reiter M., Stubblebine S. ACM Transactions on Information and System Security 2(2): 138-158, 1999.  Type: Article

This paper addresses the issue of determining the owner of a public key or, on the other hand, determining a user’s public key in order to encrypt data for secure transmission. In most real-life situations that involve differ...

Nov 1 1999
  High dictionary compression for proactive password checking
Bergadano F., Crispo B., Ruffo G. ACM Transactions on Information and System Security 1(1): 3-25, 1998.  Type: Article, Reviews: (1 of 2)

If users are allowed to choose their own passwords, they often choose ones that hackers can find in a dictionary of common passwords. As a countermeasure, a computer system can check a password when the user chooses it, to force a non-...

Jun 1 1999
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy