-
3
-
-
84941155031
-
-
Anti-Phishing Working Group. http://www.antiphishing.org/.
-
-
-
-
5
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In EUROCRYPT, pp. 268-286, 1999.
-
(1999)
EUROCRYPT
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
6
-
-
19744380329
-
Spamming, phishing, authentication, and privacy
-
December
-
S. M. Bellovin. Spamming, phishing, authentication, and privacy. Inside Risks, Communications of the ACM, 47:12, December 2004.
-
(2004)
Inside Risks, Communications of the ACM
, vol.47
, pp. 12
-
-
Bellovin, S.M.1
-
7
-
-
20444490057
-
Off-the-record communication, or, why not to use PGP
-
ACM Press
-
N. Borisov, I. Goldberg, and E. Brewer. Off-the-record communication, or, why not to use PGP. In WPES '04, pp. 77-84. ACM Press, 2004.
-
(2004)
WPES '04
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
8
-
-
41849092597
-
Deniable authentication with rsa and multicasting
-
D. R. Brown. Deniable authentication with rsa and multicasting. In Cryptology ePrint Archive, Report 2005/056, 2005.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.56
-
-
Brown, D.R.1
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO, pp. 174-187, 1994.
-
(1994)
CRYPTO
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
25144519584
-
Phish. and hips: Human interactive proofs to detect phishing attacks
-
HIP
-
R. Dhamija and J. D. Tygar. Phish. and hips: Human interactive proofs to detect phishing attacks. In HIP, vol. 3517 of LNCS, pp. 127-141, 2005.
-
(2005)
LNCS
, vol.3517
, pp. 127-141
-
-
Dhamija, R.1
Tygar, J.D.2
-
12
-
-
84941147384
-
Spam attacks: P2P to the rescue
-
E. D. et. al. Spam Attacks: P2P to the Rescue. In WWW '04, pp. 358-359, 2004.
-
(2004)
WWW '04
, pp. 358-359
-
-
D., E.1
-
13
-
-
84941165675
-
Internet X.509 public key infrastructure (latest draft)
-
Jan.
-
M. C. et. al. Internet X.509 Public Key Infrastructure (latest draft). IETF Internet Drafts, Jan. 2005.
-
(2005)
IETF Internet Drafts
-
-
C., M.1
-
14
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
Nov.
-
S. L. Garfinkel. Email-Based Identification and Authentication: An Alternative to PKI? IEEE Security & Privacy, 1(6):20-26, Nov. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.L.1
-
15
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
L. C. Guillou and J.-J. Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In CRYPTO, vol. 403, pp. 216-231, 1988.
-
(1988)
CRYPTO
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
16
-
-
23944479821
-
Controlling spam by secure internet content selection
-
vol. 3352 of LNCS
-
A. Herzberg. Controlling spam by secure internet content selection. In 4th Security in Communication Networks (SCN), vol. 3352 of LNCS, pp. 337-350, 2004.
-
(2004)
4th Security in Communication Networks (SCN)
, pp. 337-350
-
-
Herzberg, A.1
-
17
-
-
84941160073
-
SMTP service exten. for secure SMTP over transport layer security
-
P. Huffman. SMTP Service Exten. for Secure SMTP over Transport Layer Security. Internet Mail Consortium RFC. http://www.faqs.org/rfcs/rfc3207.html.
-
Internet Mail Consortium RFC
-
-
Huffman, P.1
-
18
-
-
84941159672
-
-
IETF. The DKIM Working Group, http://mipassoc.org/dkim/.
-
-
-
-
20
-
-
26444453924
-
Modeling and preventing phishing attacks
-
A. Patrick and M. Yung, editors, LNCS
-
M. Jakobsson. Modeling and Preventing Phishing Attacks. In A. Patrick and M. Yung, editors, Financial Cryptography '05, LNCS, 2005.
-
(2005)
Financial Cryptography '05
-
-
Jakobsson, M.1
-
21
-
-
84927752554
-
Designated verifier proofs and their applications
-
EUROCRYPT '96
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT '96, vol. 1233 of LNCS, 1996.
-
(1996)
LNCS
, vol.1233
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
26
-
-
51249094052
-
Filtering spam with SpamAssassin
-
J. Mason. Filtering Spam with SpamAssassin. In HEANet Conference, 2002.
-
(2002)
HEANet Conference
-
-
Mason, J.1
-
28
-
-
13944276290
-
SpamBayes: Effective open-source, Bayesian based, email classification system
-
July
-
T. Meyer and B. Whateley. SpamBayes: Effective open-source, Bayesian based, email classification system. In Conference on Email and Anti-Spam, July 2004.
-
(2004)
Conference on Email and Anti-spam
-
-
Meyer, T.1
Whateley, B.2
-
30
-
-
84857630832
-
-
Microsoft. The Sender ID Framework, http://www.microsoft.com/mscorp/ safety/technologies/senderid/default.mspx.
-
The Sender ID Framework
-
-
-
32
-
-
84941157007
-
-
Z. News. http://news.zdnet.com/2100-9595_22-519795.html?legacy=zdnn.
-
-
-
News, Z.1
-
33
-
-
84946833891
-
How to leak a secret
-
ASIACRYPT '01
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In ASIACRYPT '01, vol. 2248 of LNCS, pp. 552-565, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
36
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO '84
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO '84, vol. 196 of LNCS, pp. 47-53, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
37
-
-
84910623624
-
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
-
D. Smetters and G. Durfee. Domain-based administration of identity-based cryptosystems for secure email and IPSEC. In USENIX Security Symposium, 2003.
-
(2003)
USENIX Security Symposium
-
-
Smetters, D.1
Durfee, G.2
|