Password Managers, Single Sign-On, Federated ID: Have users signed up? - Konstantin Beznosov - Konstantin Beznosov, "Password Managers, Single Sign-On, Federated ID: Have users signed up?," panel presentation given at "Workshop on The Future of User Authentication and Authorization on the Web: Challenges in Current Practice, New Threats, and Research Directions," 4 March 2011, 23 pages.: - LERSSE-PRESENTATION-2011-002
 
People who viewed this page also viewed:
(1142)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(1099)  Design and Analysis of a Social Botnet - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.: - LERSSE-RefJnlPaper-2012-002
(1081)  Towards Agile Security Assurance - Konstantin Beznosov et al - Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54 - LERSSE-RefConfPaper-2005-015
(1079)  Is OpenID too Open? Technical, Business, and Human Issues That Get in the Way of OpenID and Ways of Addressing Them - San-Tsai Sun et al - San-Tsai Sun and Konstantin Beznosov, "Is OpenID too Open? Technical, Business, and Human Issues That Get in the Way of OpenID and Ways of Addressing Them," presented at Eurecom, February 24, 2011. 57 pages.: - LERSSE-PRESENTATION-2011-001
(1045)  Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures - San-Tsai Sun et al - San-Tsai Sun, Kirstie Hawkey, and Konstantin Beznosov. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security, Accepted 7 February 2012.: - LERSSE-RefJnlPaper-2012-001


Download history: