scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
If the adversary cannot use the stolen cookies to impersonate the victim, stealing cookie has no meaning.
Open accessProceedings ArticleDOI
Ari Juels, Markus Jakobsson, T.N. Jagatic 
21 May 2006
66 Citations
The ideas we introduce for cache-cookie management can strengthen ordinary cookies as well.
This work presents a new possibility to produce cookies based on an agro-industrial co-products, which is interesting for the market for this type of product.
Journal ArticleDOI
Emil Sit, Kevin Fu 
19 Citations
Despite the lack of security in the design of cookies, their flexibility makes them highly attractive for authentication.
In so doing, we demonstrate that one-time cookies can significantly improve the security of Web applications with minimal impact on performance and scalability.
Open accessProceedings ArticleDOI
Ari Juels, Markus Jakobsson, T.N. Jagatic 
21 May 2006
66 Citations
As we show, our techniques can also help combat online security threats such as phishing and pharming that ordinary cookies cannot.
Open accessProceedings ArticleDOI
Ari Juels, Markus Jakobsson, T.N. Jagatic 
21 May 2006
66 Citations
In this paper, we show that despite limitations, cache cookies can play a useful role in the identification and authentication of users.

See what other people are reading

What are the current ethical guidelines for the development of AI systems in education?
5 answers
Current ethical guidelines for the development of AI systems in education encompass various key principles. These include ensuring transparency, fairness, and accountability in AI algorithms to prevent biased outcomes. Additionally, safeguarding student data privacy is crucial to address ethical risks associated with AI technology in education. It is essential to bridge educational gaps and promote equity by allocating resources effectively in AI education applications. Furthermore, ethical considerations should focus on promoting autonomy, privacy, trust, and responsibility in the use of AI in education. Guidelines also emphasize the importance of incorporating principles such as pedagogical appropriateness, children's rights, AI literacy, and teacher well-being in AI systems developed for K-12 education.
What are the Social, Legal, and Ethical Implications Related to Privacy in Social Web Applications?
4 answers
Social web applications have revolutionized personal and professional interactions, blurring the lines between public and private domains, raising concerns about privacy invasion. Employers increasingly use social media for candidate screening, potentially breaching privacy by accessing personal data without consent. Ethical dilemmas arise in online health research recruitment, where privacy risks must be mitigated to protect participants' sensitive information. Key ethical and privacy issues include providing meaningful user notice, ensuring accurate access control, anonymizing data, and validating algorithms to prevent harm and abuse. Balancing the benefits of social web applications with privacy concerns necessitates establishing fair information policies and respecting individuals' rights to privacy.
How to fix inadequate healthcare systems in developing countries?
5 answers
To address inadequate healthcare systems in developing countries, a multifaceted approach is essential. Firstly, implementing a centralized, permissioned Blockchain-based secured healthcare system can enhance data security and citizen privacy. Secondly, shifting health expenditures from out-of-pocket to pooled can significantly improve health outcomes, as seen in various countries. Additionally, strategic and comprehensive outreach programs, focusing on healthcare, education, and humanitarian assistance, can foster sustainable change in underprivileged communities. Leveraging modern technologies like IoT, cloud computing, and mobile applications can extend healthcare services to rural areas, improving monitoring, data transmission, and disease control. Lastly, utilizing information technology for patient record management, appointments, pharmaceutical access, and community insurance can enhance healthcare access, especially during crises like the COVID-19 pandemic. By integrating these strategies, developing countries can work towards fixing their inadequate healthcare systems effectively.
What can i use to learn about rocky programe wich deal with dem?
5 answers
To learn about the ROCKY program, which deals with improving the robustness of STT-MRAM cache memory hierarchy against write failures, you can refer to research by Talebi et al.. The ROCKY architecture proposes efficient replacement policies to enhance the reliability of STT-MRAM memories by reducing susceptible transitions during write operations. The study demonstrates that ROCKY can decrease the Write Error Rate (WER) of STT-MRAM cache memories by up to 35.4% with minimal performance overhead. This research provides valuable insights into addressing the critical reliability challenges faced by STT-MRAM technology, particularly focusing on mitigating write failures in cache memory hierarchies. By studying the ROCKY program, you can gain a deeper understanding of strategies to enhance the robustness of STT-MRAM-based systems in the face of reliability issues.
What are the most effective strategies for combating online pornography-related crimes?
5 answers
Hub attacks were found to be most effective at reducing network density and clustering in disrupting online child pornography networks, while fragmentation attacks were effective at reducing distance-based cohesion and average path length. In the context of combating online pornography-related crimes, the Chinese government has taken a proactive approach by implementing various countermeasures such as increased law-making, strengthened law enforcement, and the use of new technology. Additionally, the limitations of law enforcement in cyberporn cases have led to the need for non-penal approaches, including crime prevention through situational control and active involvement of cultural roles in the community. Understanding the characteristics of group criminality and group crimes is crucial, as they involve joint criminal activities that may not always be assessed as crimes by the law.
What are the negative impact of Drones in terms of Privacy Concerns for Tourism industry?
4 answers
The negative impact of drones on privacy concerns in the tourism industry is significant. Drones' use raises privacy issues for both users and non-users at tourism destinations. Security and privacy vulnerabilities in drone technology pose challenges due to insufficient security measures. Commercial drones are at risk of compromising personal data, emphasizing the need for better privacy regulations. Drones operate uniquely, potentially capturing data inaccessible to other technologies, leading to limited privacy protections. Legal regulations, such as the Aviation Safety Act, aim to address privacy infringements by drones, emphasizing the importance of obtaining licenses and following strict flying regulations to protect personal information.
What is the legal and ethical issues in network traffic analysis?
5 answers
Legal and ethical issues in network traffic analysis encompass concerns regarding privacy, data protection laws, and the ethical implications of monitoring individuals' online activities. The collection and analysis of network data can potentially infringe on individuals' privacy rights, especially when it involves capturing communication content without consent. Data protection laws regulate the monitoring of communications and the processing of personally identifiable information, necessitating safeguards to prevent unlawful data use. Ethical considerations include the need for informed consent, adherence to human subjects research protocols, and addressing unexpected data anomalies to ensure ethical study design and implementation. Additionally, monitoring peer-to-peer networks raises specific ethical concerns that researchers must be aware of when conducting such analyses.
What are the negative impact of Drones in terms of Privacy Concerns for Film and media industry?
5 answers
Drones pose significant privacy concerns for the film and media industry. They can capture personal data, including audio, video, and location information, which are at risk of compromise through various attacks. The use of drones equipped with cameras raises issues of unauthorized filming and potential infringement of individuals' right to privacy. Moreover, the data collected by drones can be accessed by multiple parties, potentially leading to widespread sharing and distribution without the individual's consent. These privacy risks highlight the need for more effective regulations and guidelines to secure drones and protect personal data in the film and media industry.
What are the negative impact of Drones in terms of Vulnerability to Hacking for Defense and military sector?
5 answers
Drones, particularly in defense and military sectors, face significant vulnerabilities to hacking, posing various negative impacts. These unmanned aerial vehicles (UAVs) are susceptible to cyber-attacks like GPS spoofing, de-authentication, denial of services, and injecting false information. The onboard resources limitations and weaknesses in existing policies contribute to the challenge of implementing effective cybersecurity solutions. Cyber-attacks on UAVs can lead to severe consequences such as data theft, UAV deactivation, or unauthorized control by malicious entities. Communication security is crucial as UAVs often carry sensitive information, making them prime targets for adversaries. To mitigate these risks, it is essential to address vulnerabilities proactively and implement robust defense mechanisms in UAV systems.
What are the main characteristic of data markets?
5 answers
Data markets are characterized by the exchange of data among autonomous agents to enhance learning models. They have emerged as a new business model where data can be collected, processed, and traded. However, current data markets rely on trusted third parties, posing risks to data privacy and security. The design of data markets is crucial for firms utilizing machine learning predictions, considering the externality of data allocation to competing firms. Data is increasingly recognized as a valuable asset, leading to the need for common data sharing platforms like data marketplaces. These marketplaces can be centralized or decentralized, facilitating direct data exchange between producers and consumers. In essence, data markets enable the buying and selling of data to meet the diverse needs of various stakeholders while addressing privacy, security, and competitive concerns.
What are the negative impact of Drones in terms of Privacy Concerns for Aviation industry?
5 answers
Drones pose significant privacy concerns in the aviation industry. These concerns stem from various factors such as unauthorized access to sensitive data, including identity and location, through remote identification systems. Additionally, the widespread use of drones equipped with cameras raises the risk of capturing personal information without consent, potentially leading to legal issues related to privacy infringement. Moreover, the complexity of drone technology, coupled with vulnerabilities in software and hardware, opens up avenues for malicious actors to compromise security and privacy, highlighting the need for robust countermeasures and mitigation techniques. Overall, the increasing use of drones in aviation brings about a pressing need for enhanced regulations and guidelines to safeguard individuals' privacy rights.