Filters








22,598 Hits in 3.3 sec

Is Everything We Know About Password-Stealing Wrong?

Dinei Florencio, Cormac Herley
2012 IEEE Security and Privacy  
We show that, in spite of appearances, password-stealing is a bad business proposition.  ...  First, emptying accounts is extremely hard: transferring money in a way that is irreversible can generally only be done in a way that cannot later be repudiated.  ...  Otherwise every single one of their customers has a wide open opportunity for fraud without even needing to steal a password.  ... 
doi:10.1109/msp.2012.57 fatcat:sxopejal2rfanb4nnosec5yk4u

Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks

Stuart E. Schechter, Cormac Herley, Michael Mitzenmacher
2010 USENIX Security Symposium  
We create an oracle to identify undesirably popular passwords using an existing data structure known as a count-min sketch, which we populate with existing users' passwords and update with each new user  ...  password.  ...  Passwords that are a single insertion, deletion, or substitution from a dictionary word will be be refused. Bergadano et al.  ... 
dblp:conf/uss/SchechterHM10 fatcat:lodjvht3pzbwpntm4drnpc4jki

Everything VPN is New Again

David Crawshaw
2020 Queue  
Like all things that try to be everything to everyone, however, for many of us the prospect of setting it up (and, more importantly, maintaining it) is daunting.  ...  single-purpose process and one user.  ...  Before that, he worked on a variety of software projects, including the Go programming language.  ... 
doi:10.1145/3434571.3439745 fatcat:aljwzuu6vje65bvyjklcvyd35u

Merge Everything It Makes Sense to Merge

Paul Kauppila, Sandra E. Belanger, Lisa Rosenblum
2007 Collection Management  
Library in San Jose, California is a unique dual-use library serving the students of San Jose State University and the community of San Jose, California.  ...  The reference collections of the two libraries are merged and interfiled to promote ease of access for both populations served.  ...  A single collection development policy for the King reference collection was developed: http://staff.sjlibrary.org/programs/policies.htm?  ... 
doi:10.1300/j105v31n03_04 fatcat:f7pu72u2jvcvppg6g4h5vkhvoe

"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts

Mahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna
2021 Proceedings on Privacy Enhancing Technologies  
Although many technologies assume that a device or an account would be used by a single user, prior research has found that this assumption may not hold true in everyday life.  ...  Most studies conducted to date focused on sharing a device or account with the members in a household.  ...  We are thankful to our shepherd, Cheng Guo and the anonymous reviewers for their thoughtful and detailed feedback.  ... 
doi:10.2478/popets-2021-0067 fatcat:az45n2yk6na5jk7zmxzct3lute

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
2019 The World Wide Web Conference on - WWW '19  
For this, we design and implement CONRAD, a holistic mechanism to detect CSync events at real time, and the privacy loss on the user side, even when the synced IDs are obfuscated.  ...  As a result, web companies invest a lot in elaborate tracking mechanisms to acquire user data that can sell to data markets and advertisers.  ...  However, after one single CSync, those two different names can be joined into a single user profile, effectively merging all data in the two datasets.  ... 
doi:10.1145/3308558.3313542 dblp:conf/www/PapadopoulosKM19 fatcat:76k3lqs2c5dpley7zmodyywrqe

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
KU is a collaborative initiative designed to make high quality books Open Access. More information about the initiative can be found at www.knowledgeunlatched.org  ...  Congestion is a very important factor in wireless sensor network (WSN) and also it reduces quality of services.  ...  protocol to transmit urgent data Abstract: Sensor network is designed to provide monitoring services especially for natural disaster.  ... 
doi:10.1515/9783110628517-fm fatcat:3npfgq3o65f5pdbphf6pi4qn3a

'I May Have Misrecalled Everything'. John Banville's The Untouchable

V. Stewart
2003 English  
For some years prior to his public ‘unmasking’, however, Blunt had been undergoing debriefing by MI5 6 Alan Bennett, A Question of Attribution in Single S; (London: Faber & Faber, 1989) pp. 21-61 (p. 59  ...  uc AUTUMN 2003 237-251 VOLUME 52 ENGLISH ‘| MAY HAVE MISRECALLED EVERYTHING’.  ... 
doi:10.1093/english/52.204.237 fatcat:tpmtgticjrgr3mctaxlssw4rde

»We welcome you to your HEROES community. Remember, everything is connected«. A Case Study in Transmedia Storytelling

Anne Ganzert, Mediarep.Org
2021 Image  
Depending on varying levels of involvement, this fandom generated a number of HEROES ›experts‹, creating a tiered hierarchy.  ...  RUPPEL 2012: 61), yet there is a tangible lack of attention to what Jason Mittell has termed »forensic fandom« (MITTELL 2015: n.pag.).  ...  After clicking on the symbol a login window appeared, asking for a name and password. The name »bennet« was already filled in and the matching password was easy to guess.  ... 
doi:10.25969/mediarep/16506 fatcat:nlqkkwszjffhpkl4pipxyf2xuy

Internet of Nano-Things, Things and Everything: Future Growth Trends

Mahdi Miraz, Maaruf Ali, Peter Excell, Richard Picking
2018 Future Internet  
The current statuses and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano-Things (IoNT) are extensively reviewed and a summarized survey is presented.  ...  However, the dangers of criminal and other nefarious activities, plus those of hardware and software errors, pose major challenges that are a priority for further research.  ...  The Mirai malware searched for those devices whose usernames and passwords had not been changed from their default values to infect them.  ... 
doi:10.3390/fi10080068 fatcat:6r4sustavnagtkg6xdknem6wmm

Everything Old is New Again: Binary Security of WebAssembly

Daniel Lehmann, Johannes Kinder, Michael Pradel
2020 USENIX Security Symposium  
Moreover, WebAssembly enables unique attacks, such as overwriting supposedly constant data or manipulating the heap using a stack overflow.  ...  We provide a set of vulnerable proof-of-concept applications along with complete end-to-end exploits, which cover three WebAssembly platforms.  ...  design web application; the 1Password X 1.17 browser extension 9 contains a WebAssembly component for password generation; Doom 3 as an example of a large game engine ported to WebAssembly 10 ; and finally  ... 
dblp:conf/uss/0002KP20 fatcat:ofl2a27nu5e7jdltik2xzx47pu

"I'll have everything in diamonds!": students' experiences with minecraft at school

Agnieszka B. Jarvoll
2018 Studia Paedagogica  
The present research was carried out as a single case study. This implies an in-depth investigation of a contemporary phenomenon, an intervention, studied in its real-life context, the classroom.  ...  This study suggests that formative interventions in which the researcher is present in a school context implicates the possibilities for the study of externalisation processes.  ...  Introduction "I'll have everything in diamonds! A sword and everything! A pickaxe and a spade, and everything there is!"  ... 
doi:10.5817/sp2018-4-4 fatcat:j4czgzzwhbckzkswtcpjtb7t5e

The Preferred-Basis Problem and the Quantum Mechanics of Everything

Jeffrey A. Barrett
2005 British Journal for the Philosophy of Science  
Jereon Vink (1993) argued that there are two options for what he called a realistic solution to the quantum measurement problem: (1) select a preferred set of observables for which definite values are  ...  The potential costs and benefits of a formulation of quantum mechanics where every physical quantity is determinate are herein examined. 1  ...  Bohm's theory shows how assumptions (i) and (ii) can be false by showing how everything one knows about the physical world might be mediated by the value of a single physical quantity and the standard  ... 
doi:10.1093/bjps/axi114 fatcat:hgpsjhhkuravxgafqtb5pz2etq

Sensors of Smart Devices in the Internet of Everything (IoE) Era: Big Opportunities and Massive Doubts

Mohammad Masoud, Yousef Jaradat, Ahmad Manasrah, Ismael Jannoud
2019 Journal of Sensors  
However, the extracted information may be used to compromise the security and the privacy of humans in the era of Internet of Everything (IoE).  ...  Moreover, ANN support multioutput unlike SVM that supports single output.  ...  Introduction Internet of Everything (IoE) is an information technological term that combines sensing, computation, information extraction, and communication functionalities together in a device.  ... 
doi:10.1155/2019/6514520 fatcat:lxlva7xfbra7flwt6jby7dc5xy

Internet of Everything enabled solution for COVID-19, its new variants and future pandemics: Framework, Challenges, and Research Directions [article]

Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev
2021 arXiv   pre-print
We present hypothetical frameworks for each of the good practice modules and propose the COvid-19 Resistance Framework using the Internet of Everything (CORFIE) to tie all the individual modules in a unified  ...  The governments, hospitals, schools, industries, and humans, in general, are looking for a potential solution in the vaccine which will eventually be available but its timeline for eradicating the virus  ...  Furthermore, we presented COvid-19 Resistance Framework using the Internet of Everything (CORFIE) which combines the aforementioned modules into a single framework.  ... 
arXiv:2101.02030v3 fatcat:qynccobvvrdalbpsxmmnutfngi
« Previous Showing results 1 — 15 out of 22,598 results