Michael Reiter

Results: 71



#Item
61Password / Entropy / Salt / Public-key cryptography / Key / Brute-force attack / Password strength / Password cracking / Cryptography / Key management / Randomness

Cryptographic Key Generation from Voice (Extended Abstract) Fabian Monrose Michael K. Reiter

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
62Data / K-medoids / Medoid / Network packet / Transmission Control Protocol / K-means clustering / Communications protocol / Statistics / Information / Cluster analysis

Amplifying Limited Expert Input to Sanitize Large Network Traces Xin Huang, Fabian Monrose, Michael K. Reiter Department of Computer Science University of North Carolina at Chapel Hill Chapel Hill, NC, USA {huangxin,fabi

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-21 20:09:54
63Measuring instruments / Molecular biology / Microarrays

Towards Optimized Probe Scheduling for Active Measurement Studies N. Daniel Kumar, Fabian Monrose, and Michael K. Reiter Department of Computer Science University of North Carolina Chapel Hill, NC, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 22:01:10
64Password / Access control / Cryptographic software / Keystroke dynamics / Salt / Transaction authentication number / OTPW / Security / Cryptography / Computer security

IJIS[removed]: 1–15 / Digital Object Identifier (DOI[removed]s102070100006 Password hardening based on keystroke dynamics Fabian Monrose, Michael K. Reiter∗ , Susanne Wetzel Bell Labs, Lucent Technologies, Murray

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
65Access control / Computer security / Identity management / File system / Authorization / Tar / Trusted Computing / Internet privacy / Tag / Computing / System software / Information

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter* Carnegie Mellon Univer

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-02-11 18:31:55
66File system / Access control / Authorization / Tag / Computer file / Privilege / PERMIS / Tar / Information / Computing / Security

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter CMU-PDL[removed]June 2013

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-05-01 18:18:17
67Pavel Vinogradov / Expedition 13 / Extra-vehicular activity / STS-121 / Thomas Reiter / Michael López-Alegría / STS-124 / Peggy Whitson / Spaceflight / Human spaceflight / Aquanauts

Roundup 06 NASA/Ingalls JSC2006E11941

Add to Reading List

Source URL: www.jsc.nasa.gov

Language: English - Date: 2006-05-10 15:48:19
68Women in technology / Fourth of July / STS-121 / Thomas Reiter / Steven Lindsey / Stephanie Wilson / STS-116 / Michael E. Fossum / Astronaut birthplaces by state / Spaceflight / Human spaceflight / Women in engineering

Meet the diverse group of astronauts who are going to continue our Return to Flight efforts with this second test flight. STEVE LINDSEY Commander

Add to Reading List

Source URL: www.jsc.nasa.gov

Language: English - Date: 2006-03-07 15:26:16
69Access control / Computer security / Filesystem permissions / Group / Usability / Photo sharing / Recall / Ls / Identity management / Computing / Security

Out of sight, out of mind: Effects of displaying access-control information near the item it controls Kami Vaniea∗ , Lujo Bauer∗ , Lorrie Faith Cranor∗ , and Michael K. Reiter† ∗ Carnegie Mellon University, Pit

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 09:01:57
70Social information processing / Web 2.0 / Blog hosting services / Social media / Real-time web / Facebook / Internet privacy / Twitter / Social networking service / World Wide Web / Computing / Software

The Post Anachronism: The Temporal Dimension of Facebook Privacy Lujo Bauer∗ , Lorrie Faith Cranor∗ , Saranga Komanduri∗ , Michelle L. Mazurek∗ , Michael K. Reiter† , Manya Sleeper∗ , Blase Ur∗ ∗

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2013-09-09 17:21:23
UPDATE