Now showing items 1-4 of 4
Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials
(Georgia Institute of Technology, 2009)
A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials
(Georgia Institute of Technology, 2011)
One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens
(Georgia Institute of Technology, 2012-02)
HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter
(Georgia Institute of Technology, 2010)
The growing popularity of Twitter and its ability to enable near instantaneous sharing of information has made it a target of attacks by malicious entities who use it to spam and provide links to malware. There is evidence ...