Using Closed Itemsets for Implicit User Authentication in Web Browsing (original) (raw)

XML Security

Ernesto Damiani

Security, Privacy, and Trust in Modern Data Management, 2007

View PDFchevron_right

Towards Privacy-Enhanced Authorization Policies and Languages

Ernesto Damiani

Lecture Notes in Computer Science, 2005

View PDFchevron_right

n-Auth

Juha Häikiö

Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

View PDFchevron_right

A Theory of Access*

Jesse Ribot

Rural Sociology, 2009

View PDFchevron_right

Securing Interactive Programs

Daniel Hedin

2012 IEEE 25th Computer Security Foundations Symposium, 2012

View PDFchevron_right

Stronger authentication for password credential Internet Services

Todd Booth

2017 Third International Conference on Mobile and Secure Services (MobiSecServ), 2017

View PDFchevron_right

A framework for incremental generation of closed itemsets

Robert Godin

Discrete Applied Mathematics, 2008

View PDFchevron_right

Usable Security: A Systematic Literature Review

Giorgia Tempestini

Information, 2023

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

User authentication schemes for mobile and handheld devices

Naveen kumar

View PDFchevron_right

Article OPEN ACCESS

Cristiano Fidani

2013

View PDFchevron_right

An Authorization Mechanism for a Document Database

Reijo Sulonen

1994

View PDFchevron_right

Implementing New-age Authentication Techniques using OpenID for Security Automation

Rekha Shahapurkar

Arxiv preprint arXiv: …, 2010

View PDFchevron_right

Adaptive Authentication using User’s Uniqueness Quotient

Harippriya Sivapatham

2019

View PDFchevron_right

Information-Flow-Based Access Control for Web Browsers

Sachiko Yoshihama

IEICE Transactions on Information and Systems, 2009

View PDFchevron_right

Privacy patterns for online interactions

Jason Hong

Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06, 2006

View PDFchevron_right

Rendered Insecure

Hoda Naghibijouybari

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

View PDFchevron_right

A Frequent Itemset Hiding Toolbox

Vassilios Verykios

Lecture Notes in Computer Science, 2019

View PDFchevron_right

Externalism and privileged access are inconsistent

Michael McKinsey

2007

View PDFchevron_right

EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services

Mike P Papazoglou

Distributed and Parallel Databases, 2005

View PDFchevron_right

Items

Ja-Ling Wu

Proceedings of the international workshop on Workshop on multimedia information retrieval - MIR '07, 2007

View PDFchevron_right

Anti-individualism and privileged access

Michael McKinsey

Analysis, 1991

View PDFchevron_right

Access EAP: Foundations

Gwen Klassen

Journal of English for Academic Purposes, 2013

View PDFchevron_right

Report of the Ad Hoc Committee on Open Access

Louis Kirschenbaum

2012

View PDFchevron_right

Active Protection of Trusted Security Services

Alec Yasinsac

2000

View PDFchevron_right