enter search term and/or author name
Active honeytokens are fake digital data objects planted among real data objects and used in an attempt to detect data misuse by insiders. In this article, we are interested in understanding how users (e.g., employees) behave when interacting with...
A New Framework for Privacy-Preserving Aggregation of Time-Series Data
Fabrice Benhamouda, Marc Joye, BenoîT Libert
Article No.: 10
Aggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users. Such encryption schemes find...
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics
Nan Zheng, Aaron Paloski, Haining Wang
Article No.: 11
Biometric authentication verifies a user based on its inherent, unique characteristics—who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their...