-
1
-
-
23244463535
-
Detecting web bugs with bugnosis: Privacy advocacy through education
-
San Fransicsco, CA. Springer-Verlag, Berlin
-
ALSAID, A. AND MARTI, D. 2002. Detecting web bugs with bugnosis: Privacy advocacy through education. In Proceedings of the 2nd Workshop on Privacy Enhancing Technologies, San Fransicsco, CA. Springer-Verlag, Berlin.
-
(2002)
Proceedings of the 2nd Workshop on Privacy Enhancing Technologies
-
-
Alsaid, A.1
Marti, D.2
-
2
-
-
84860979223
-
-
ANTICSOFT LIMITED. 2000 WebAssurity. Online resource, http://www.articsoft.com/webassurity.htm.
-
(2000)
WebAssurity
-
-
-
3
-
-
23244438835
-
Making something look hacked when it isn't
-
Dec.
-
BARBALAC, R. 2000. Making something look hacked when it isn't. The Risks Digest 21, 16 (Dec.).
-
(2000)
The Risks Digest
, vol.21
, pp. 16
-
-
Barbalac, R.1
-
5
-
-
23244468492
-
-
Personal communication
-
DEAN, D. AND WALLACH, D. 2001. Personal communication.
-
(2001)
-
-
Dean, D.1
Wallach, D.2
-
7
-
-
0004160350
-
-
Prentice Hall, Englewood Cliffs, NJ
-
DIX, A., FINLAY, J., ABOWD, G., AND BEALE, R. 1997. Human-Computer Interaction, 2 ed. Prentice Hall, Englewood Cliffs, NJ.
-
(1997)
Human-computer Interaction, 2 Ed.
-
-
Dix, A.1
Finlay, J.2
Abowd, G.3
Beale, R.4
-
8
-
-
23244447855
-
The nature of a usable PKI
-
ELLISON, C. 1999. The nature of a usable PKI. Computer Networks 31.
-
(1999)
Computer Networks
, vol.31
-
-
Ellison, C.1
-
9
-
-
23244448401
-
-
Personal communication
-
ELLISON, C. 2000. Personal communication.
-
(2000)
-
-
Ellison, C.1
-
10
-
-
0034140877
-
Protecting secret keys with personal entropy
-
ELLISON, C., HALL, C., MILBERT, R., AND SCHNEIER, B. 2000. Protecting secret keys with personal entropy. Future Generation Computer Systems 16.
-
(2000)
Future Generation Computer Systems
, vol.16
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
11
-
-
0005785915
-
Web spoofing: An internet con game
-
Baltimore, MD
-
FELTEN, E., BALFANZ, D., DEAN, D., AND WALLACH, D. 1997. Web spoofing: An internet con game. In The 20th National Information Systems Security Conference, Baltimore, MD.
-
(1997)
The 20th National Information Systems Security Conference
-
-
Felten, E.1
Balfanz, D.2
Dean, D.3
Wallach, D.4
-
12
-
-
0742281746
-
How do people evaluate a web site's credibility? Results from a large study
-
Consumer WebWatch/Stanford Persuasive Technology Lab.
-
FOGG, B., SOOHOO, C., DANIELSON, D., MARABLE, L., STANFORD, J., AND TAUBER, E. 2002. How do People Evaluate a Web Site's Credibility? Results from a Large Study. Tech. Rep., Consumer WebWatch/Stanford Persuasive Technology Lab.
-
(2002)
Tech. Rep.
-
-
Fogg, B.1
Soohoo, C.2
Danielson, D.3
Marable, L.4
Stanford, J.5
Tauber, E.6
-
13
-
-
0038726078
-
User's conceptions of web security: A comparative study
-
Minneapolis, MN. Extended abstracts.
-
FRIEDMAN, B., HURLEY, D., HOWE, D., FELTEN, E., AND NISSENBAUM, H. 2003. User's conceptions of web security: A comparative study. In ACM/CHI2002 Conference on Human Factors and Computing Systems, Minneapolis, MN. Extended abstracts.
-
(2003)
ACM/CHI2002 Conference on Human Factors and Computing Systems
-
-
Friedman, B.1
Hurley, D.2
Howe, D.3
Felten, E.4
Nissenbaum, H.5
-
16
-
-
2342505463
-
Securing Web servers against insider attack
-
New Orleans, LA
-
JIANG, S., SMITH, S., AND MINAMI, K. 2001. Securing Web servers against insider attack. In the 17th ACSA/ACM Computer Security Applications Conference, New Orleans, LA.
-
(2001)
The 17th ACSA/ACM Computer Security Applications Conference
-
-
Jiang, S.1
Smith, S.2
Minami, K.3
-
17
-
-
17844367773
-
Digital signatures and electronic documents: A cautionary tale
-
Kluwer Academic, Norwell, MA
-
KAIN, K., SMITH, S., AND ASOKAN, R. 2002. Digital signatures and electronic documents: A cautionary tale. In Advanced Communications and Multimedia Security. Kluwer Academic, Norwell, MA.
-
(2002)
Advanced Communications and Multimedia Security
-
-
Kain, K.1
Smith, S.2
Asokan, R.3
-
18
-
-
35248863938
-
Cut-&-paste attacks with JAVA
-
Information Security and Cryptology - ICISC 2002 Springer-Verlag, Berlin
-
LEFRANC, S. AND NACCACHE, D. 2003. Cut-&-paste attacks with JAVA. In Information Security and Cryptology - ICISC 2002. LNCS 2587, Springer-Verlag, Berlin.
-
(2003)
LNCS
, vol.2587
-
-
Lefranc, S.1
Naccache, D.2
-
19
-
-
84883270143
-
Keyjacking: Risks of the current client-side infrastructure
-
Gaithersburg, MD
-
MARCHESINI, J., SMITH., S., AND ZHAO, M. 2003. Keyjacking: Risks of the current client-side infrastructure. In Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg, MD.
-
(2003)
Proceedings of the 2nd Annual PKI Research Workshop
-
-
Marchesini, J.1
Smith, S.2
Zhao, M.3
-
20
-
-
23244468095
-
Extra! extra!: Internet hoax, get the details
-
MAREMONT, M. 1999. Extra! extra!: Internet hoax, get the details. The Wall Street Journal.
-
(1999)
The Wall Street Journal
-
-
Maremont, M.1
-
21
-
-
84860980782
-
-
MOZILLA ORGANIZATION, THE. 2001. Gecko DOM reference. Online resource, http://www.mozilla.org/docs/dom/domref/dom_window_ref.html.
-
(2001)
Gecko DOM Reference
-
-
-
22
-
-
23244462058
-
-
Personal communication
-
NORMAN, E. 2002. Personal communication.
-
(2002)
-
-
Norman, E.1
-
28
-
-
84860980398
-
-
SECURE SOFTWARE, INC. EGADS homepage. Online resource, http://www.securesoftware.com/download_form_egads.htm.
-
EGADS Homepage
-
-
-
29
-
-
35048849808
-
WebALPS: Using trusted co-servers to enhance privacy and security of web interactions
-
Tech. Rep.
-
SMITH, S. 2000. WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions. Tech. Rep. IBM T.J. Watson Research Center Research Report RC 21851.
-
(2000)
IBM T.J. Watson Research Center Research Report
, vol.RC 21851
-
-
Smith, S.1
-
30
-
-
21644485287
-
WebALPS: A survey of e-commerce privacy and security applications
-
SMITH, S. 2001. WebALPS: A survey of e-commerce privacy and security applications. ACM SIGecom Exchanges 2.3.
-
(2001)
ACM SIGecom Exchanges 2.3
-
-
Smith, S.1
-
31
-
-
0034809926
-
Practical server privacy using secure coprocessors
-
SMITH, S. AND SAFFORD, D. 2001. Practical server privacy using secure coprocessors. IBM Systems Journal 40.
-
(2001)
IBM Systems Journal
, vol.40
-
-
Smith, S.1
Safford, D.2
-
32
-
-
84860977765
-
-
SULLIVAN, B. 2000. Scam artist copies payPal Web site. The page expired, but related discussion exists at http://www.landfield.com/isn/mail-archive/2000/ Jul/0100.html.
-
(2000)
Scam Artist Copies PayPal Web Site
-
-
Sullivan, B.1
-
33
-
-
33846969431
-
How do consumers form their judgments of the security of e-commerce web sites?
-
Fort Lauderdale, FL
-
TURNER, C. 2003. How do consumers form their judgments of the security of e-commerce web sites? In ACM/CHI2003 Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale, FL. http://www.andrewpatrick.ca/CHI2003/ HCISEC/index.html.
-
(2003)
ACM/CHI2003 Workshop on Human-computer Interaction and Security Systems
-
-
Turner, C.1
-
35
-
-
84860982788
-
-
UNITED STATES SECURITIES AND EXCHANGE COMMISSION. 1999. Litigation release no. 16266. Online Resource, http://www.sec.gov/litigation/litreleases/ lr16266.htm.
-
(1999)
Litigation Release No. 16266
-
-
-
36
-
-
23244467723
-
-
Personal communication
-
WEISER, R. 2001. Personal communication.
-
(2001)
-
-
Weiser, R.1
-
38
-
-
23244449257
-
-
M.S. Thesis, Department of Computer Science, Dartmouth College, Hanover, NH
-
YE, Z. 2002. Building trusted paths for Web browsers. M.S. Thesis, Department of Computer Science, Dartmouth College, Hanover, NH.
-
(2002)
Building Trusted Paths for Web Browsers
-
-
Ye, Z.1
-
40
-
-
2642577193
-
Web spoofing revisited: SSL and beyond
-
Department of Computer Science, Dartmouth College, TR2002-417
-
YE, Z., YUAN, Y., AND SMITH, S. 2002. Web Spoofing Revisited: SSL and Beyond. Tech. Rep. Department of Computer Science, Dartmouth College, TR2002-417.
-
(2002)
Tech. Rep.
-
-
Ye, Z.1
Yuan, Y.2
Smith, S.3
|