Search

Your search keyword '"Dietrich, Sven"' showing total 213 results

Search Constraints

Start Over You searched for: Author "Dietrich, Sven" Remove constraint Author: "Dietrich, Sven"
213 results on '"Dietrich, Sven"'

Search Results

51. A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?

52. Improving Usability by Adding Security to Video Conferencing Systems.

53. Mental Models of Security Risks.

54. Phishing IQ Tests Measure Fear, Not Ability.

55. What Instills Trust? A Qualitative Study of Phishing.

56. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.

57. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.

58. Usability Analysis of Secure Pairing Methods.

59. WSKE: Web Server Key Enabled Cookies.

60. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.

61. An Efficient Aggregate Shuffle Argument Scheme.

62. Certificate Revocation Using Fine Grained Certificate Space Partitioning.

63. Virtual Economies: Threats and Risks.

64. The Unbearable Lightness of PIN Cracking.

65. Dynamic Virtual Credit Card Numbers.

66. Informant: Detecting Sybils Using Incentives.

67. Improved Multi-party Contract Signing.

68. On Authentication with HMAC and Non-random Properties.

69. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.

70. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.

71. K-Anonymous Multi-party Secret Handshakes.

72. A Model of Onion Routing with Provable Anonymity.

73. Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.

74. Position Statement in RFID S&P Panel: RFID and the Middleman.

75. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.

76. Conditional E-Cash.

77. Preface.

78. Position Statement in RFID S&P Panel: Contactless Smart Cards.

81. Leaving Room for the Bad Guys.

82. Personal Digital Rights Management for Mobile Cellular Devices.

83. Usable SPACE: Security, Privacy, and Context for the Mobile User.

84. Panel: RFID Security and Privacy.

85. Quantifiable Run-Time Kernel Attack Surface Reduction

86. Bee Master: Detecting Host-Based Code Injection Attacks

87. Parallelization of Network Intrusion Detection Systems under Attack Conditions

88. AV-Meter: An Evaluation of Antivirus Scans and Labels

89. Phoenix: DGA-Based Botnet Tracking and Intelligence

90. Diagnosis and Emergency Patch Generation for Integer Overflow Exploits

91. AndRadar: Fast Discovery of Android Applications in Alternative Markets

92. Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware

93. Instruction-Level Steganography for Covert Trigger-Based Malware : (Extended Abstract)

94. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics

95. Attacks on Android Clipboard

96. PExy: The Other Side of Exploit Kits

97. Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! : (Or: Automated Techniques to Recover Split and Merged Variables)

98. Identifying Shared Software Components to Support Malware Forensics

99. Spamming for Science: Active Measurement in Web 2.0 Abuse Research

100. High Stakes: Designing a Privacy Preserving Registry

Catalog

Books, media, physical & digital resources