Graeme

Results: 1404



#Item
81Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
82Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
83Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
84Computer access control / Password / Authentication / HTTP cookie / Login / Pico / Security token

Bootstrapping adoption of the Pico password replacement system Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington {frank.stajano, graeme.jenkinson, jeunese.payne, max.s

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-08-28 15:17:52
85Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:42:08
86

QUCEH WORKING PAPER SERIES http://www.quceh.org.uk/working-papers WHO FINANCED THE EXPANSION OF THE EQUITY MARKET? SHAREHOLDER CLIENTELES IN VICTORIAN BRITAIN Graeme G. Acheson (University of Stirling)

Add to Reading List

Source URL: www.quceh.org.uk

Language: English - Date: 2015-10-22 08:52:29
    87

    Article pubs.acs.org/JPCC Optical Determination of Silicon Nanowire Diameters for Intracellular Applications John F. Zimmerman,† Graeme F. Murray,† and Bozhi Tian*,†,‡,§

    Add to Reading List

    Source URL: tianlab.uchicago.edu

    Language: English - Date: 2015-12-17 14:08:39
      88

      Patience Pays When Toilet Training by A. Graeme Garscadden, MD Pediatrician, Colorado Springs Health Partners, PC It seems that parents are forever encouraged to be patient in the care and

      Add to Reading List

      Source URL: www.cshpkids.net

      Language: English - Date: 2010-09-21 14:47:15
        89

        HIGGS BUNDLES OVER CELL COMPLEXES AND REPRESENTATIONS OF FINITELY PRESENTED GROUPS GEORGIOS DASKALOPOULOS, CHIKAKO MESE, AND GRAEME WILKIN A BSTRACT. The purpose of this paper is to extend the Donaldson-Corlette theorem

        Add to Reading List

        Source URL: www.math.brown.edu

        Language: English - Date: 2016-01-18 09:58:23
          90

          Resolving Shell Nouns Graeme Hirst Department of Computer Science University of Toronto Toronto, ON, M5S 3G4, Canada

          Add to Reading List

          Source URL: emnlp2014.org

          Language: English - Date: 2014-10-16 05:19:28
            UPDATE