21 |
Semantic-Directed Clumping of Disjunctive Abstract States *
|
|
|
|
In: POPL 2017 - 44th ACM SIGPLAN Symposium on Principles of Programming Languages ; https://hal.inria.fr/hal-01648679 ; POPL 2017 - 44th ACM SIGPLAN Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.32-45, ⟨10.1145/3009837.3009881⟩ (2017)
|
|
BASE
|
|
Show details
|
|
22 |
Copredication in homotopy type theory
|
|
|
|
In: https://hal.archives-ouvertes.fr/hal-01628150 ; 2017 (2017)
|
|
BASE
|
|
Show details
|
|
23 |
Mobile user authentication system (MUAS) for e-commerce applications.
|
|
|
|
Abstract:
The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protocol. This thesis focuses on developing a system that can circumvent MITB attacks using a two-phase secure-user authentication system, with phases that include challenge and response generation. The proposed system represents the first step in conducting an online business transaction.The proposed authentication system design contributes to protect the confidentiality of the initiating client by requesting minimal and non-confidential information to bypass the MITB attack and transition the authentication mechanism from the infected browser to a mobile-based system via a challenge/response mechanism. The challenge and response generation process depends on validating the submitted information and ensuring the mobile phone legitimacy. Both phases within the MUAS context mitigate the denial-of-service (DOS) attack via registration information, which includes the client’s mobile number and the International Mobile Equipment Identity (IMEI) of the client’s mobile phone.This novel authentication scheme circumvents the MITB attack by utilising the legitimate client’s personal mobile phone as a detached platform to generate the challenge response and conduct business transactions. Although the MITB attacker may have taken over the challenge generation phase by failing to satisfy the required security properties, the response generation phase generates a secure response from the registered legitimate mobile phone by employing security attributes from both phases. Thus, the detached challenge- and response generation phases are logically linked.
|
|
Keyword:
005 Computer programming; E-commerce; Mobile User Authentication; programs & data; QA75 Electronic computers. Computer science; Security
|
|
URL: https://napier-surface.worktribe.com/1035289/1/Mobile%20user%20authentication%20system%20%28MUAS%29%20for%20e-commerce%20applications http://researchrepository.napier.ac.uk/Output/1035289
|
|
BASE
|
|
Hide details
|
|
24 |
The mat sat on the cat : investigating structure in the evaluation of order in machine translation
|
|
McCaffery, Martin. - : University of St Andrews, 2017. : The University of St Andrews, 2017
|
|
BASE
|
|
Show details
|
|
25 |
Computational analysis of tongue image for health diagnosis
|
|
Zhang, Meng. - : University of Missouri--Columbia, 2017
|
|
In: Submited to University of Missouri--Columbia Graduate School. (2017)
|
|
BASE
|
|
Show details
|
|
26 |
Speech-to-text technology and education : pre-service teachers' collaborative professional development as case study
|
|
Wilcox, Kevin. - : Nipissing University, Faculty of Education, 2017
|
|
BASE
|
|
Show details
|
|
27 |
Speech-to-text technology and education : pre-service teachers' collaborative professional development as case study
|
|
|
|
BASE
|
|
Show details
|
|
28 |
Applications of Text Analytics in the Intelligence Community
|
|
|
|
BASE
|
|
Show details
|
|
30 |
Использование компьютерных программ, основанных на лингвистическом анализе ложной информации (обзор зарубежного исследования)
|
|
ХОЛЕВЧУК А.Г.. - : Общество с ограниченной ответственностью «Коллоквиум», 2015
|
|
BASE
|
|
Show details
|
|
31 |
Интерактивная компьютерная программа по развитию описательной связной речи для детей и взрослых с речевой патологией
|
|
ИВАНОВА НАТАЛИЯ НИКОЛАЕВНА. - : Федеральное государственное бюджетное образовательное учреждение высшего образования «Удмуртский государственный университет», 2015
|
|
BASE
|
|
Show details
|
|
32 |
Non-linear Second order Abstract Categorial Grammars and deletion
|
|
|
|
In: NLCS 2015: Natural Language and Computer Science ; https://hal.archives-ouvertes.fr/hal-01251127 ; NLCS 2015: Natural Language and Computer Science, Makoto Kanazawa, 2015, Kyoto, Japan (2015)
|
|
BASE
|
|
Show details
|
|
33 |
The Impact of the Use of Dynamic Software as a Teaching Tool in Geometry
|
|
|
|
BASE
|
|
Show details
|
|
34 |
Program Design: The Learner Path
|
|
|
|
In: Research Briefs and Case Studies (2015)
|
|
BASE
|
|
Show details
|
|
35 |
Program Design: Volunteering in a Digital Literacy Program
|
|
|
|
In: Research Briefs and Case Studies (2015)
|
|
BASE
|
|
Show details
|
|
36 |
Program Design: Tutor-Facilitated Digital Literacy Acquisition
|
|
|
|
In: Research Briefs and Case Studies (2015)
|
|
BASE
|
|
Show details
|
|
37 |
Program Design: Learning Digital Skills in a Corrections Setting
|
|
|
|
In: Research Briefs and Case Studies (2015)
|
|
BASE
|
|
Show details
|
|
38 |
Program Design: Learning Digital Skills in a Time-limited Program
|
|
|
|
In: Research Briefs and Case Studies (2015)
|
|
BASE
|
|
Show details
|
|
40 |
Exploring Social Meaning in Online Bilingual Text through Social Network Analysis
|
|
|
|
In: DTIC (2015)
|
|
BASE
|
|
Show details
|
|
|
|