Filters








50,783 Hits in 3.6 sec

soaPDB: a web application for searching the Protein Data Bank, organizing results, and receiving automatic email alerts

C. A. Lesburg, J. S. Duca
2008 Nucleic Acids Research  
This tool is used from a web interface to store PDB searches and results in a backend relational database.  ...  soaPDB is a web application that allows generation and organization of saved PDB searches, and offers automatic email alerts.  ...  Login Upon authentication, the user is presented with a main page where his/her own and other's saved searches are listed along with number of search results (Figure 1b) .  ... 
doi:10.1093/nar/gkn270 pmid:18487276 pmcid:PMC2447792 fatcat:7mcnhq3g4fcwnchohmjlqjvtkq

Cloudsweeper and data-centric security

Peter Snyder, Chris Kanich
2014 Computers & society  
As a result, Internet users are required to jump through several hoops to access their data: ever longer passwords, multiple authentication factors, or time consuming CAPTCHAs.  ...  First, Cloudsweeper searches through the messages in a user's email account for pieces of text that may be passwords.  ... 
doi:10.1145/2656870.2656872 fatcat:sze5g4jpbvhgtek263ybjrne7a

Phishing in healthcare organisations: threats, mitigation and approaches

Ward Priestman, Tony Anstis, Isabel G Sebire, Shankar Sridharan, Neil J Sebire
2019 BMJ Health & Care Informatics  
We also searched the medical-related literature to identify relevant phishing-related publications.  ...  Hospitals receive a significant volume of potentially malicious emails.  ...  Any user that clicked on the hyperlink in the email resulted in their web browser redirecting to a fake login page, which attempted to trick users to authenticate (anyone actually submitting their authentication  ... 
doi:10.1136/bmjhci-2019-100031 pmid:31488498 pmcid:PMC7062337 fatcat:algpuxjqhzdpla3m2xnpnkx5ii

CloudSweeper

Peter Snyder, Chris Kanich
2013 Proceedings of the 2013 ACM workshop on Cloud computing security workshop - CCSW '13  
We present performance measurements showing that the system can rewrite past emails stored at cloud providers quickly, along with initial results regarding user preferences for redacted cloud storage.  ...  We show that Cloudsweeper can efficiently assist users in pinpointing and protecting passwords emailed to them in cleartext.  ...  Of the subset of users who have opted into this data collection, 1,992 Gmail accounts have been searched. 497 users chose to encrypt the results of their search, resulting in 19,658 messages encrypted  ... 
doi:10.1145/2517488.2517495 dblp:conf/ccs/SnyderK13 fatcat:eza5aufu25hh5lm6czsjjk4zg4

A survey on social network sites' functional features [article]

Antonio Tapiador, Diego Carrera
2012 arXiv   pre-print
Results show some universal features, such as comments support, public sharing of contents, system notifications and profile pages with avatars.  ...  A strong tendency in using external services for authentication and contact recognition has been found, which is quite significant in top SNS.  ...  Results on Facebook's friend recognition may be higher if authentication were performed using Facebook, instead of using an email-based sign up.  ... 
arXiv:1209.3650v1 fatcat:dizgktxftjaztd7vszimcvqc3m

myGenomeBrowser: building and sharing your own genome browser

Sébastien Carrere, Jérôme Gouzy
2016 Bioinformatics  
A JSON file containing emails and keys manages the 'authorization' layer. An 'htpasswd' file containing emails and passwords manages the 'authentication' layer.  ...  Like for keyword searches, the similarity results show sequence alignments cross-linked to the target genomic regions directly on the genome browser.  ... 
doi:10.1093/bioinformatics/btw800 pmid:28011789 pmcid:PMC5408841 fatcat:tme5ijcmenaepn7zx3yqk5u3kq

Variable Techniques for Ciphertext Retrieval through Encrypted Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
authentication.  ...  To defending privacy breaches from unauthorized users, users will go through authentication process and data retrieval time as well.  ...  Proposed model offers authorize users to get secret key via their Email address as they registered their selves by authentication process. V.  ... 
doi:10.35940/ijitee.l2608.1081219 fatcat:arzomrzd4bfctmomvho2scy3fu

Preventing Information Leakage from Indexing in the Cloud

Anna Squicciarini, Smitha Sundareswaran, Dan Lin
2010 2010 IEEE 3rd International Conference on Cloud Computing  
ProofPoint stores email archives in distributed fashion across the grid infrastructure and provide email search using parallel search technology.  ...  The index host must apply these policies for each searcher to filter search results appropriately.  ... 
doi:10.1109/cloud.2010.82 dblp:conf/IEEEcloud/SquicciariniSL10 fatcat:4jxgy2ohnzgh5k7wwel6twm7o4

'Publish or Perish' Trend: Fueling the Predatory Journals

Alok Atreya
2020 Journal of Lumbini Medical College  
They can choose any random article from the past issue and search the title to see if the search results match the journal and authors. d.  ...  They collect the email addresses of the corresponding authors who have already published in good journals and send them spam emails. The emails usually start with a praise of the recent publication.  ... 
doi:10.22502/jlmc.v8i2.409 doaj:43af8a265495423fb63e3c5c147e2deb fatcat:3n22df4wz5gwvjhjjxrh5jz7eq

Identifying Phishing Threats in Government Web Services

Yunsang Oh, Takashi Obi
2012 International Journal of Information and Network Security (IJINS)  
Unfortunately, unique governmental characteristics lead users to authenticate its service unwillingly; users may investigate service's possible and likely vulnerabilities carelessly when perceiving trustworthiness  ...  In practice, however, the authentication gateway itself can also be the target of phishing attack. Freedom in authentication gateway usage results in better authentication solutions.  ...  In our Web search conducted in March 2010, we easily found names and resident registration numbers of a few Koreans in a Web search engine.  ... 
doi:10.11591/ijins.v2i1.844 fatcat:fezn6mzcpjhkbmzzzwn43gksfy

Introducing Orcid

Tom DeMeranville
2017 Zenodo  
: Get a user's authenticated ORCID iD • Read (Public): Search/retrieve public data • Create: Facilitate creation of new ORCID records (via on-demand process) • Read (Limited): Search/retrieve limited-access  ...  a record • Update: Edit or delete items you previously added Premium Member API Premium ORCID member organizations • Webhooks: Receive notifications of updates • Customised monthly reports (including email  ...  (In process: ability to request email access, even if private.) the auth code confirming that you are the right one to get this information THE ORCID API IN A NUTSHELL STEP 3B: STORE THE RESULT The  ... 
doi:10.5281/zenodo.495149 fatcat:fwiddgo4drdtfloces34dsfvhu

The InterMine Android app: Cross-organism genomic data in your pocket

Daria Komkova, Rachel Lyne, Julie Sullivan, Yo Yehudi, Gos Micklem
2019 F1000Research  
The InterMine app provides a single interface for data access, search and exploration of the InterMine databases.  ...  Simple searches can be used to access a range of data about a specific gene, while links to the InterMine databases provide access to more detailed report pages and gene list analysis tools.  ...  Search results can be shared via email, instant messaging, and other sharing media in text format, using Android’s ACTION_SEND Intent functionality 20 .  ... 
doi:10.12688/f1000research.17005.2 fatcat:k2oiacmj7jhcfbwvkf7737yxhe

Large-Scale-Exploit of GitHub Repository Metadata and Preventive Measures [article]

David Knothe, Frederick Pietschmann
2019 arXiv   pre-print
When working with Git, a popular version-control system, email addresses are part of the metadata for each individual commit.  ...  When those commits are pushed to remote hosting services like GitHub, those email addresses become visible not only to fellow developers, but also to malicious actors aiming to exploit them.  ...  The resulting query url could look like this: https://api.github.com/search/repositories?q= stars:>5&sort=stars&page=0.  ... 
arXiv:1908.05354v2 fatcat:khcmx4g4vvhijp5keax57qhcxe

1 + 1 = you

Stuart Schechter, Robert W. Reeder
2009 Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09  
Backup authentication systems verify the identity of users who are unable to perform primary authentication-usually as a result of forgetting passwords.  ...  Many webmail users cannot benefit from email-based authentication because their webmail account is their primary email account.  ...  Check all webmail services for which you've had to reset your password in order to get into your account: Other non-email web service 16. What search engine do you use to search the web?  ... 
doi:10.1145/1572532.1572544 dblp:conf/soups/SchechterR09 fatcat:4b5rdvkzfvfhdaqwvr6qtpdoum

SMART Mail - A SMART Platform for Mail Management

Ricardo Raminhos, Eduardo Coutinho, Nuno Miranda, Maria Barbas, Paulo Branco, Teresa Gonçalves, Gil Palma
2016 Proceedings of the 18th International Conference on Enterprise Information Systems  
In fact, a significant amount of their time is spent searching and getting context information (normally historic information) in order to prepare a reply message or to take a decision/action, when compared  ...  Email is a key communication format in a digital world, both for professional and/or personal usage.  ...  Thus, after a successful Authentication by the user, it is possible to search for Organizations and Contacts through the Search module in natural language terms.  ... 
doi:10.5220/0005814503780387 dblp:conf/iceis/RaminhosCMBBGP16 fatcat:wa5lrht7t5ekneuhfqygieaf6q
« Previous Showing results 1 — 15 out of 50,783 results