Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Systems, methods and apparatus for controlling access to mobile devices
CR Crawford, JS Nell - US Patent 8,346,217, 2013 - Google Patents
US8346217B2 - Systems, methods and apparatus for controlling access to mobile devices -
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …
Personal knowledge questions for fallback authentication: Security questions in the era of Facebook
A Rabkin - Proceedings of the 4th Symposium on Usable Privacy …, 2008 - dl.acm.org
Security questions (or challenge questions) are commonly used to authenticate users who
have lost their passwords. We examined the password retrieval mechanisms for a number of …
have lost their passwords. We examined the password retrieval mechanisms for a number of …
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
All four of the most popular webmail providers-AOL, Google, Microsoft, and Yahoo!-rely on
personal questions as the secondary authentication secrets used to reset account …
personal questions as the secondary authentication secrets used to reset account …
Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google
We examine the first large real-world data set on personal knowledge question's security
and memorability from their deployment at Google. Our analysis confirms that secret …
and memorability from their deployment at Google. Our analysis confirms that secret …
Systems, methods and apparatus for authenticating access to enterprise resources
CR Crawford, JS Nell - US Patent 8,401,522, 2013 - Google Patents
An understanding of embodiments described in this dis closure and many of the attendant
advantages may be readily obtained by reference to the following detailed description when …
advantages may be readily obtained by reference to the following detailed description when …
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication
solutions, yet there are few published studies concerning their usability or security. This …
solutions, yet there are few published studies concerning their usability or security. This …
It's not what you know, but who you know: a social approach to last-resort authentication
Backup authentication mechanisms help users who have forgotten their passwords regain
access to their accounts-or at least try. Today's systems fall short in meeting both security …
access to their accounts-or at least try. Today's systems fall short in meeting both security …
Accuracy of performance counter measurements
D Zaparanuks, M Jovic… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Many experimental performance evaluations depend on accurate measurements of the cost
of executing a piece of code. Often these measurements are conducted using infrastructures …
of executing a piece of code. Often these measurements are conducted using infrastructures …
Selections: Internet voting with over-the-shoulder coercion-resistance
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …