• Publications
  • Influence
Crowds: anonymity for Web transactions
TLDR
In this paper we introduce a system called Crowds for protecting users' anonymity on the world-wide-web. Expand
  • 2,081
  • 251
  • PDF
The Design and Analysis of Graphical Passwords
TLDR
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords. Expand
  • 914
  • 85
  • PDF
Keystroke dynamics as a biometric for authentication
TLDR
We examine an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type. Expand
  • 721
  • 50
  • PDF
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
TLDR
In this paper we propose Zerocoin, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions. Expand
  • 667
  • 49
  • PDF
A framework for detection and measurement of phishing attacks
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries toExpand
  • 400
  • 34
  • PDF
Authentication via keystroke dynamics
TLDR
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved techniques for authorized access to computer system resources and data via keystroke dynamics. Expand
  • 494
  • 31
Charm: a framework for rapidly prototyping cryptosystems
TLDR
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems, including some new ones that, to our knowledge, have never been built in practice. Expand
  • 341
  • 31
  • PDF
Analysis of an electronic voting system
TLDR
We present a security analysis of the source code to one such machine used in a significant share of the market. Expand
  • 564
  • 25
  • PDF
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
TLDR
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. Expand
  • 425
  • 21
  • PDF
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
TLDR
We propose a new protocol that works in concert with BGP, which Autonomous Systems will use to help detect and mitigate accidentally or maliciously introduced faulty routing information. Expand
  • 241
  • 18
  • PDF