-
2
-
-
33745816410
-
Why phishing works
-
Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 581-590 (2006)
-
(2006)
Proceedings of SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
4
-
-
77953767524
-
Stopping spyware at the gate: A user study of notice, privacy and spyware
-
July
-
Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., Konstan, J.: Stopping spyware at the gate: A user study of notice, privacy and spyware. In: SOUPS. Proceedings of the Symposium on Usable Privacy and Security, pp. 43-52 (July 2005)
-
(2005)
SOUPS. Proceedings of the Symposium on Usable Privacy and Security
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
5
-
-
34547355863
-
Guidelines and Strategies for secure Interaction Design
-
Cranor, L.F, Garfinkel, S, eds, O'Reilly, Sebastopol
-
Yee, K.P.: Guidelines and Strategies for secure Interaction Design. In: Cranor, L.F., Garfinkel, S. (eds.) Security and Usability: Designing Secure Systems That People Can Use. pp. 247-273, O'Reilly, Sebastopol (2005)
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 247-273
-
-
Yee, K.P.1
-
6
-
-
38549087643
-
-
DNSSEC.NET: DNS Threats and DNS Weaknesses. http://www.dnssec.net/dns- threats.php
-
DNSSEC.NET: DNS Threats and DNS Weaknesses. http://www.dnssec.net/dns- threats.php
-
-
-
-
7
-
-
78650554812
-
-
ISC: BIND Vulnerabilities. http://www.isc.org/index.pl?/sw/bind/bind- security.php
-
Vulnerabilities
-
-
-
11
-
-
38549147719
-
-
Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: Proceedings of ACM SIGCOMM (September 2006)
-
Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: Proceedings of ACM SIGCOMM (September 2006)
-
-
-
-
13
-
-
38549133165
-
-
Smith, S.W., Martini, J.C.: The Guidebook for Security Craftsmen (working title). Addison-Wesley, forthcoming book material from AWL 0321434838 (2007)
-
Smith, S.W., Martini, J.C.: The Guidebook for Security Craftsmen (working title). Addison-Wesley, forthcoming book material from AWL 0321434838 (2007)
-
-
-
-
14
-
-
38549145099
-
-
Personal Communication
-
Sirer, G.: Personal Communication (2006)
-
(2006)
-
-
Sirer, G.1
-
15
-
-
38549102802
-
-
XULPlanet.com: XULPlanet.com (2006), http://www.xulplanet.com
-
(2006)
-
-
-
16
-
-
38549103855
-
-
Foundation
-
Foundation, M.: Mozilla Cross-Reference (2006), http://lxr.mozilla.org/ seamonkey/
-
(2006)
M.: Mozilla Cross-Reference
-
-
-
18
-
-
38549132625
-
-
MonkeeSage: Basic javascript file and directory IO module v2.1 (2006), available at http://kb.mozillazine.org/Io.js
-
MonkeeSage: Basic javascript file and directory IO module v2.1 (2006), available at http://kb.mozillazine.org/Io.js
-
-
-
-
21
-
-
38549090815
-
-
SpoofStick: Spoofstick home (2007), http://www.spoofstick.com/
-
(2007)
Spoofstick home
-
-
-
23
-
-
85084161317
-
Trusted Paths for Browsers
-
Ye, E., Smith, S.: Trusted Paths for Browsers. In: 11th USENIX Security Symposium (2002), http://www.cs.dartmouth.edu/~sws/papers/usenix02.pdf
-
(2002)
11th USENIX Security Symposium
-
-
Ye, E.1
Smith, S.2
-
24
-
-
38549162371
-
-
Karlof, C.K., Shankar, U., Tygar, D., Wagner, D.: Locked cookies: Web authentication security against phishing, pharming, and active attacks. Technical Report UCUCB/EECS-2007-25UCB/EECS-2007-25, Electrical Engineering and Computer Sciences University of California at Berkeley (February 2007)
-
Karlof, C.K., Shankar, U., Tygar, D., Wagner, D.: Locked cookies: Web authentication security against phishing, pharming, and active attacks. Technical Report UCUCB/EECS-2007-25UCB/EECS-2007-25, Electrical Engineering and Computer Sciences University of California at Berkeley (February 2007)
-
-
-
|