Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2008
Use Your Illusion: secure authentication usable anywhere
SOUPS '08: Proceedings of the 4th symposium on Usable privacy and securityPages 35–45https://doi.org/10.1145/1408664.1408670In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version ...
- ArticleMay 2007
The Emperor's New Security Indicators
SP '07: Proceedings of the 2007 IEEE Symposium on Security and PrivacyPages 51–65https://doi.org/10.1109/SP.2007.35We evaluate website authentication measures that are designed to protect users from man-in-the-middle, "phishing', and other site forgery attacks. We asked 67 bank customers to conduct common online banking tasks. Each time they logged in, we presented ...
- ArticleMay 2006
Phoiling phishing
WWW '06: Proceedings of the 15th international conference on World Wide WebPage 749https://doi.org/10.1145/1135777.1135888In the last few years, Internet users have seen the rapid expansion of "phishing", the use of spoofed e-mails and fraudulent websites designed to trick users into divulging sensitive data. More recently, we have seen the growth of "pharming", the use of ...
- doctoral_thesisJanuary 2005
Authentication for humans: the design and evaluation of usable security systems
How can we make computer security systems usable by human users__ __ Computer security demands that we establish the identity of human users who access individual computers and online services. Conversely, human users need to be able to authenticate the ...