Using Closed Itemsets for Implicit User Authentication in Web Browsing (original) (raw)
Related papers
Security, Privacy, and Trust in Modern Data Management, 2007
Towards Privacy-Enhanced Authorization Policies and Languages
Lecture Notes in Computer Science, 2005
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Rural Sociology, 2009
2012 IEEE 25th Computer Security Foundations Symposium, 2012
Stronger authentication for password credential Internet Services
2017 Third International Conference on Mobile and Secure Services (MobiSecServ), 2017
A framework for incremental generation of closed itemsets
Discrete Applied Mathematics, 2008
Usable Security: A Systematic Literature Review
Information, 2023
From Security Protocols to Systems Security
Lecture Notes in Computer Science, 2005
User authentication schemes for mobile and handheld devices
2013
An Authorization Mechanism for a Document Database
1994
Implementing New-age Authentication Techniques using OpenID for Security Automation
Arxiv preprint arXiv: …, 2010
Adaptive Authentication using User’s Uniqueness Quotient
2019
Information-Flow-Based Access Control for Web Browsers
IEICE Transactions on Information and Systems, 2009
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06, 2006
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
A Frequent Itemset Hiding Toolbox
Lecture Notes in Computer Science, 2019
Externalism and privileged access are inconsistent
2007
EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services
Distributed and Parallel Databases, 2005
Proceedings of the international workshop on Workshop on multimedia information retrieval - MIR '07, 2007
Anti-individualism and privileged access
Analysis, 1991
Journal of English for Academic Purposes, 2013
Report of the Ad Hoc Committee on Open Access
2012
Active Protection of Trusted Security Services
2000