-
1
-
-
38549160217
-
-
Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web Spoofing: An Internet Con Game. In: 20th National Information Systems Security Conference (October 1997)
-
Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web Spoofing: An Internet Con Game. In: 20th National Information Systems Security Conference (October 1997)
-
-
-
-
2
-
-
38549095777
-
-
Anti-phishing working group
-
Anti-phishing working group: http://www.antiphishing.org
-
-
-
-
6
-
-
85044841595
-
Client-side defense against web-based identity theft
-
Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.: Client-side defense against web-based identity theft. In: NDSS. Proceedings of Network and Distributed Systems Security (2004)
-
(2004)
NDSS. Proceedings of Network and Distributed Systems Security
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.4
-
7
-
-
38549169196
-
-
Google, Inc
-
Google, Inc.: Google safe browsing for firefox (2006), http://www.google.com/tools/firefox/safebrowsing/
-
(2006)
Google safe browsing for firefox
-
-
-
9
-
-
38549112119
-
-
GeoTrust, Inc
-
GeoTrust, Inc.: TrustWatch Toolbar (2006), http://toolbar.trustwatch.com/
-
(2006)
TrustWatch Toolbar
-
-
-
10
-
-
84898190494
-
Phinding Phish: Evaluating AntiPhishing Tools
-
Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: Evaluating AntiPhishing Tools. In: NDSS. Proceedings of the 14th Annual Network and Distributed System Security Symposium (2007)
-
(2007)
NDSS. Proceedings of the 14th Annual Network and Distributed System Security Symposium
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
11
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsers
-
Waterloo, Ontario, Canada, pp, Canadian Human-Computer Communications Society
-
Whalen, T., Inkpen, K.M.: Gathering evidence: Use of visual security cues in web browsers. In: GI 2005. Proceedings of the 2005 conference on Graphics interface, School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, pp. 137-144. Canadian Human-Computer Communications Society (2005)
-
(2005)
GI 2005. Proceedings of the 2005 conference on Graphics interface, School of Computer Science, University of Waterloo
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
12
-
-
38549152495
-
-
Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. CHI. (2006)
-
Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. CHI. (2006)
-
-
-
-
15
-
-
85084161247
-
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
-
Whitten, A., Tygar, J.: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In: 8th Usenix Security Symposium, pp. 169-184 (1999)
-
(1999)
8th Usenix Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
-
16
-
-
33745851447
-
Do Security Toolbars Actually Prevent Phishing Attacks?
-
Wu, M., Miller, R., Garfinkel, S.: Do Security Toolbars Actually Prevent Phishing Attacks? In: Proc. CHI. (2006)
-
(2006)
Proc. CHI
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
17
-
-
38549173332
-
-
Passmark: http://www.passmarksecurity.com
-
Passmark
-
-
-
18
-
-
23244459906
-
Trusted Paths for Browsers
-
Ye, Z.E., Smith, S., Anthony, D.: Trusted Paths for Browsers. ACM Transactions on Information and System Security 8(2), 153-186 (2005)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.E.1
Smith, S.2
Anthony, D.3
-
20
-
-
38549159176
-
-
Dierks, T, Allen, C, The TLS Protocol, Version 1.0. IETF RFC 2246 January 1999
-
Dierks, T., Allen, C.: The TLS Protocol - Version 1.0. IETF RFC 2246 (January 1999)
-
-
-
-
21
-
-
38549163890
-
-
Parno, B., Kuo, C., Perrig, A.: Authentication and Fraud Detection: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, Springer, Heidelberg (2006)
-
Parno, B., Kuo, C., Perrig, A.: Authentication and Fraud Detection: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, Springer, Heidelberg (2006)
-
-
-
-
24
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger Password Authentication Using Browser Extensions. In: Proceedings of the 14th Usenix Security Symposium (2005)
-
(2005)
Proceedings of the 14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
29
-
-
34250778342
-
The methodology and an application to fight against Unicode attacks
-
ACM Press, New York
-
Fu, A.Y., Deng, X., Wenyin, L., Little, G.: The methodology and an application to fight against Unicode attacks. In: SOUPS 2006. Proceedings of the second symposium on Usable privacy and security, pp. 91-101. ACM Press, New York (2006)
-
(2006)
SOUPS 2006. Proceedings of the second symposium on Usable privacy and security
, pp. 91-101
-
-
Fu, A.Y.1
Deng, X.2
Wenyin, L.3
Little, G.4
|