A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
soaPDB: a web application for searching the Protein Data Bank, organizing results, and receiving automatic email alerts
2008
Nucleic Acids Research
This tool is used from a web interface to store PDB searches and results in a backend relational database. ...
soaPDB is a web application that allows generation and organization of saved PDB searches, and offers automatic email alerts. ...
Login Upon authentication, the user is presented with a main page where his/her own and other's saved searches are listed along with number of search results (Figure 1b) . ...
doi:10.1093/nar/gkn270
pmid:18487276
pmcid:PMC2447792
fatcat:7mcnhq3g4fcwnchohmjlqjvtkq
Cloudsweeper and data-centric security
2014
Computers & society
As a result, Internet users are required to jump through several hoops to access their data: ever longer passwords, multiple authentication factors, or time consuming CAPTCHAs. ...
First, Cloudsweeper searches through the messages in a user's email account for pieces of text that may be passwords. ...
doi:10.1145/2656870.2656872
fatcat:sze5g4jpbvhgtek263ybjrne7a
Phishing in healthcare organisations: threats, mitigation and approaches
2019
BMJ Health & Care Informatics
We also searched the medical-related literature to identify relevant phishing-related publications. ...
Hospitals receive a significant volume of potentially malicious emails. ...
Any user that clicked on the hyperlink in the email resulted in their web browser redirecting to a fake login page, which attempted to trick users to authenticate (anyone actually submitting their authentication ...
doi:10.1136/bmjhci-2019-100031
pmid:31488498
pmcid:PMC7062337
fatcat:algpuxjqhzdpla3m2xnpnkx5ii
CloudSweeper
2013
Proceedings of the 2013 ACM workshop on Cloud computing security workshop - CCSW '13
We present performance measurements showing that the system can rewrite past emails stored at cloud providers quickly, along with initial results regarding user preferences for redacted cloud storage. ...
We show that Cloudsweeper can efficiently assist users in pinpointing and protecting passwords emailed to them in cleartext. ...
Of the subset of users who have opted into this data collection, 1,992 Gmail accounts have been searched. 497 users chose to encrypt the results of their search, resulting in 19,658 messages encrypted ...
doi:10.1145/2517488.2517495
dblp:conf/ccs/SnyderK13
fatcat:eza5aufu25hh5lm6czsjjk4zg4
A survey on social network sites' functional features
[article]
2012
arXiv
pre-print
Results show some universal features, such as comments support, public sharing of contents, system notifications and profile pages with avatars. ...
A strong tendency in using external services for authentication and contact recognition has been found, which is quite significant in top SNS. ...
Results on Facebook's friend recognition may be higher if authentication were performed using Facebook, instead of using an email-based sign up. ...
arXiv:1209.3650v1
fatcat:dizgktxftjaztd7vszimcvqc3m
myGenomeBrowser: building and sharing your own genome browser
2016
Bioinformatics
A JSON file containing emails and keys manages the 'authorization' layer. An 'htpasswd' file containing emails and passwords manages the 'authentication' layer. ...
Like for keyword searches, the similarity results show sequence alignments cross-linked to the target genomic regions directly on the genome browser. ...
doi:10.1093/bioinformatics/btw800
pmid:28011789
pmcid:PMC5408841
fatcat:tme5ijcmenaepn7zx3yqk5u3kq
Variable Techniques for Ciphertext Retrieval through Encrypted Data
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
authentication. ...
To defending privacy breaches from unauthorized users, users will go through authentication process and data retrieval time as well. ...
Proposed model offers authorize users to get secret key via their Email address as they registered their selves by authentication process.
V. ...
doi:10.35940/ijitee.l2608.1081219
fatcat:arzomrzd4bfctmomvho2scy3fu
Preventing Information Leakage from Indexing in the Cloud
2010
2010 IEEE 3rd International Conference on Cloud Computing
ProofPoint stores email archives in distributed fashion across the grid infrastructure and provide email search using parallel search technology. ...
The index host must apply these policies for each searcher to filter search results appropriately. ...
doi:10.1109/cloud.2010.82
dblp:conf/IEEEcloud/SquicciariniSL10
fatcat:4jxgy2ohnzgh5k7wwel6twm7o4
'Publish or Perish' Trend: Fueling the Predatory Journals
2020
Journal of Lumbini Medical College
They can choose any random article from the past issue and search the title to see if the search results match the journal and authors. d. ...
They collect the email addresses of the corresponding authors who have already published in good journals and send them spam emails. The emails usually start with a praise of the recent publication. ...
doi:10.22502/jlmc.v8i2.409
doaj:43af8a265495423fb63e3c5c147e2deb
fatcat:3n22df4wz5gwvjhjjxrh5jz7eq
Identifying Phishing Threats in Government Web Services
2012
International Journal of Information and Network Security (IJINS)
Unfortunately, unique governmental characteristics lead users to authenticate its service unwillingly; users may investigate service's possible and likely vulnerabilities carelessly when perceiving trustworthiness ...
In practice, however, the authentication gateway itself can also be the target of phishing attack. Freedom in authentication gateway usage results in better authentication solutions. ...
In our Web search conducted in March 2010, we easily found names and resident registration numbers of a few Koreans in a Web search engine. ...
doi:10.11591/ijins.v2i1.844
fatcat:fezn6mzcpjhkbmzzzwn43gksfy
Introducing Orcid
2017
Zenodo
: Get a user's authenticated ORCID iD • Read (Public): Search/retrieve public data • Create: Facilitate creation of new ORCID records (via on-demand process) • Read (Limited): Search/retrieve limited-access ...
a record • Update: Edit or delete items you previously added Premium Member API Premium ORCID member organizations • Webhooks: Receive notifications of updates • Customised monthly reports (including email ...
(In process: ability to request email access, even if private.) the auth code confirming that you are the right one to get this information
THE ORCID API IN A NUTSHELL
STEP 3B: STORE THE RESULT The ...
doi:10.5281/zenodo.495149
fatcat:fwiddgo4drdtfloces34dsfvhu
The InterMine Android app: Cross-organism genomic data in your pocket
2019
F1000Research
The InterMine app provides a single interface for data access, search and exploration of the InterMine databases. ...
Simple searches can be used to access a range of data about a specific gene, while links to the InterMine databases provide access to more detailed report pages and gene list analysis tools. ...
Search results can be shared via email, instant messaging, and other sharing media in text format, using Android’s ACTION_SEND Intent functionality 20 . ...
doi:10.12688/f1000research.17005.2
fatcat:k2oiacmj7jhcfbwvkf7737yxhe
Large-Scale-Exploit of GitHub Repository Metadata and Preventive Measures
[article]
2019
arXiv
pre-print
When working with Git, a popular version-control system, email addresses are part of the metadata for each individual commit. ...
When those commits are pushed to remote hosting services like GitHub, those email addresses become visible not only to fellow developers, but also to malicious actors aiming to exploit them. ...
The resulting query url could look like this: https://api.github.com/search/repositories?q= stars:>5&sort=stars&page=0. ...
arXiv:1908.05354v2
fatcat:khcmx4g4vvhijp5keax57qhcxe
Backup authentication systems verify the identity of users who are unable to perform primary authentication-usually as a result of forgetting passwords. ...
Many webmail users cannot benefit from email-based authentication because their webmail account is their primary email account. ...
Check all webmail services for which you've had to reset your password in order to get into your account: Other non-email web service 16. What search engine do you use to search the web? ...
doi:10.1145/1572532.1572544
dblp:conf/soups/SchechterR09
fatcat:4b5rdvkzfvfhdaqwvr6qtpdoum
SMART Mail - A SMART Platform for Mail Management
2016
Proceedings of the 18th International Conference on Enterprise Information Systems
In fact, a significant amount of their time is spent searching and getting context information (normally historic information) in order to prepare a reply message or to take a decision/action, when compared ...
Email is a key communication format in a digital world, both for professional and/or personal usage. ...
Thus, after a successful Authentication by the user, it is possible to search for Organizations and Contacts through the Search module in natural language terms. ...
doi:10.5220/0005814503780387
dblp:conf/iceis/RaminhosCMBBGP16
fatcat:wa5lrht7t5ekneuhfqygieaf6q
« Previous
Showing results 1 — 15 out of 50,783 results