Md. Lutfor Rahman

Learn More
Detecting phishing attacks (identifying fake vs. real websites) and heeding security warnings represent classical user-centered security tasks subjected to a series of prior investigations. However, our understanding of user behavior underlying these tasks is still not fully mature, motivating further work concentrating at the neuro-physiological level(More)
—While many cloud storage and infrastructure systems exist today, none of them provide a mechanism for accountability of stored or user generated content. This lack of security support has been a major hurdle for auditing documents, claiming data possession, and proof of authorship. In this paper, we present a novel idea for secure accountability of timing(More)
  • 1