• Publications
  • Influence
Crowds: anonymity for Web transactions
In this paper we introduce a system called Crowds for protecting users' anonymity on the world-wide-web. Crowds, named for the notion of “blending into a crowd,” operates by grouping users into aExpand
  • 2,054
  • 259
  • Open Access
The Design and Analysis of Graphical Passwords
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords. Graphical input devicesExpand
  • 909
  • 87
  • Open Access
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives. Unfortunately,Expand
  • 712
  • 53
  • Open Access
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the potential for new types of financial interaction, it has significant limitations regarding privacy.Expand
  • 635
  • 45
  • Open Access
A framework for detection and measurement of phishing attacks
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries toExpand
  • 383
  • 33
  • Open Access
Authentication via keystroke dynamics
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved techniques for authorized access to computer system resources and data.Expand
  • 488
  • 31
Charm: a framework for rapidly prototyping cryptosystems
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems. Charm provides a number of features that explicitly support the development of new protocols, includingExpand
  • 316
  • 27
  • Open Access
Analysis of an electronic voting system
With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic votingExpand
  • 550
  • 26
  • Open Access
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, andExpand
  • 410
  • 21
  • Open Access
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
BGP is essential to the operation of the Internet, but is vulnerable to both accidental failures and malicious attacks. We propose a new protocol that works in concert with BGP, which AutonomousExpand
  • 238
  • 19
  • Open Access