![]() |
Volumn 49, Issue 4, 2006, Pages 21-25
|
Phishing mongers and posers
a,b,c
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER PRIVACY;
DATA PRIVACY;
REQUIREMENTS ENGINEERING;
SECURITY OF DATA;
MONGERS;
PASSWORDS;
PHISHING;
POSERS;
COMPUTER CRIME;
|
EID: 33745186426
PISSN: 00010782
EISSN: 00010782
Source Type: Journal
DOI: 10.1145/1121949.1121968 Document Type: Review |
Times cited : (21)
|
References (0)
|