-
1
-
-
34548344520
-
-
Anti-Phishing Working Group:, July
-
Anti-Phishing Working Group: Phishing Activity Trends Report (July 2006)
-
(2006)
Phishing Activity Trends Report
-
-
-
2
-
-
38549145118
-
-
Armando et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, Springer, Heidelberg (2005), http://www.avispa-project. org
-
Armando et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, Springer, Heidelberg (2005), http://www.avispa-project. org
-
-
-
-
3
-
-
85084162119
-
Hand-held computers can be better smart cards
-
Balfanz, D., Felten, E.: Hand-held computers can be better smart cards. In: USENIX Security (1999)
-
(1999)
USENIX Security
-
-
Balfanz, D.1
Felten, E.2
-
4
-
-
38549130509
-
-
On-line resources for victims of ATM fraud
-
Bond, M.: Phantom withdrawals: On-line resources for victims of ATM fraud, http://www.phantomwithdrawals.com
-
Phantom withdrawals
-
-
Bond, M.1
-
5
-
-
38549091330
-
-
CA Virus Information Center: Win32.Grams.I February
-
CA Virus Information Center: Win32.Grams.I (February 2005)
-
(2005)
-
-
-
7
-
-
84958955276
-
The untrusted computer problem and camera-based authentication
-
Mattern, F, Naghshineh, M, eds, Pervasive Computing, Springer, Heidelberg
-
Clarke, et al.: The untrusted computer problem and camera-based authentication. In: Mattern, F., Naghshineh, M. (eds.) Pervasive Computing. LNCS, vol. 2414, pp. 114-124. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2414
, pp. 114-124
-
-
Clarke1
-
8
-
-
38549172609
-
-
F-Secure. F-Secure virus descriptions: Cabir (June 2004)
-
F-Secure. F-Secure virus descriptions: Cabir (June 2004)
-
-
-
-
9
-
-
38549173873
-
-
F-Secure. F-Secure trojan information pages: Redbrowser.A, (March 2006)
-
F-Secure. F-Secure trojan information pages: Redbrowser.A, (March 2006)
-
-
-
-
10
-
-
38549083894
-
-
Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: An Internet con game. In: National Information Systems Security Conference (October 1997)
-
Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: An Internet con game. In: National Information Systems Security Conference (October 1997)
-
-
-
-
16
-
-
33751032041
-
-
King, et al.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)
-
King, et al.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)
-
-
-
-
18
-
-
79952010430
-
Using a personal device to strengthen password authentication from an untrusted computer
-
Technical Report TR-07-11 March
-
Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer, Technical Report TR-07-11 (March 2007), http://www.scs.carleton.ca/research/tech_reports/
-
(2007)
-
-
Mannan, M.1
van Oorschot, P.C.2
-
19
-
-
38549114809
-
Guardian: A framework for privacy control in untrusted environments
-
Technical Report 04-37 University of Massachusetts, Amherst, June
-
Margolin, N.B., Wright, M.K., Levine, B.N.: Guardian: A framework for privacy control in untrusted environments. Technical Report 04-37 (University of Massachusetts, Amherst) (June 2004)
-
(2004)
-
-
Margolin, N.B.1
Wright, M.K.2
Levine, B.N.3
-
21
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
McCune et al.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy (2005)
-
(2005)
IEEE Symposium on Security and Privacy
-
-
McCune1
-
25
-
-
85077681170
-
A crawler-based study of spyware in the web
-
Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.: A crawler-based study of spyware in the web. In: Network and Distributed System Security (NDSS) (2006)
-
(2006)
Network and Distributed System Security (NDSS)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.4
-
26
-
-
38549127936
-
-
Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, Springer, Heidelberg (2004)
-
Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, Springer, Heidelberg (2004)
-
-
-
-
27
-
-
33750059168
-
-
Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, Springer, Heidelberg (2006)
-
Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, Springer, Heidelberg (2006)
-
-
-
-
28
-
-
3142579333
-
Hash visualization: A new technique to improve real-world security
-
CrypTEC, July
-
Perrig, A., Song, D.: Hash visualization: A new technique to improve real-world security. In: Cryptographic Techniques and E-Commerce (CrypTEC) (July 1999)
-
(1999)
Cryptographic Techniques and E-Commerce
-
-
Perrig, A.1
Song, D.2
-
29
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: USENIX Security (2005)
-
(2005)
USENIX Security
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
31
-
-
84910156435
-
vTPM: Virtualizing the trusted platform module
-
Stefan Berger, R.C., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the trusted platform module. In: USENIX Security (2006)
-
(2006)
USENIX Security
-
-
Stefan Berger, R.C.1
Goldman, K.A.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
-
32
-
-
38549150518
-
-
Trend Micro: Mobile security, http://www.trendmicro.com/en/products/ mobile/tmms/evaluate/overview.htm
-
Mobile security
-
-
-
35
-
-
38549097895
-
-
Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS Workshop on Usable Privacy and Security Systems (July 2004)
-
Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS Workshop on Usable Privacy and Security Systems (July 2004)
-
-
-
-
36
-
-
23244459906
-
Trusted paths for browsers
-
Ye, Z.E., Smith, S., Anthony, D.: Trusted paths for browsers. ACM Transactions on Information and System Security (TISSEC) 8(2) (2005)
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
-
-
Ye, Z.E.1
Smith, S.2
Anthony, D.3
|