-
1
-
-
33846283646
-
Hardening Web Browsers against Man-in-the-Middle and Eavesdropping Attacks
-
May 10-14, Chiba, Japan
-
th International Conference on World Wide Web, May 10-14, 2005, Chiba, Japan, 489-498.
-
(2005)
th International Conference on World Wide Web
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.C.2
-
2
-
-
47849125533
-
-
APWG
-
APWG. http://www.anti-phishing.org/.
-
-
-
-
3
-
-
47849099740
-
-
A. Litan. Phishing Attack Victims Likely Targets for Identity Theft. FT-22-8873, Gartner Research (2004).
-
A. Litan. "Phishing Attack Victims Likely Targets for Identity Theft". FT-22-8873, Gartner Research (2004).
-
-
-
-
4
-
-
21244490135
-
Security Technologies Go Phishing
-
June
-
D. Geer. "Security Technologies Go Phishing", IEEE Computer. June 2005, 18-21.
-
(2005)
IEEE Computer
, pp. 18-21
-
-
Geer, D.1
-
5
-
-
47849128336
-
-
RSA SecurID. http://www.rsa.com.
-
-
-
-
7
-
-
34249852316
-
Designing ethical phishing experiments: A study of (ROT 13) rOnl query features
-
May 23-26, Edinburgh, Scotland
-
M. Jakobsson, J. Ratkiewicz. "Designing ethical phishing experiments: a study of (ROT 13) rOnl query features". WWW 2006, May 23-26, 2006, Edinburgh, Scotland, 513-522.
-
(2006)
WWW 2006
, pp. 513-522
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
8
-
-
47849101403
-
-
Yahoo, http://mail.yahoo.com/.
-
-
-
-
9
-
-
33751538239
-
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
-
October
-
Y. F. Anthony, W. Liu, X. Deng. "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)". IEEE Transactions on Dependable and Secure Computing, October 2006, Volume 3 (4), 301-311.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Anthony, Y.F.1
Liu, W.2
Deng, X.3
-
10
-
-
33745466910
-
The Battle Against Phishing: Dynamic Security Skins
-
July, Pittsburgh, PA, USA
-
R. Dhamija, J. D. Tygar. "The Battle Against Phishing: Dynamic Security Skins". Proceedings of the 2005 symposium on Usable Privacy and Security SOUPS '05, July 2005, Pittsburgh, PA, USA,
-
(2005)
Proceedings of the 2005 symposium on Usable Privacy and Security SOUPS '05
-
-
Dhamija, R.1
Tygar, J.D.2
-
11
-
-
34547363189
-
Privacy and authentication: Fourth-factor Authentication: Somebody You Know
-
October
-
J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, M. Yung. "Privacy and authentication: Fourth-factor Authentication: Somebody You Know". Proceedings of the 13th ACM conference on Computer and communications security (CCS '06), October 2006, 168-78.
-
(2006)
Proceedings of the 13th ACM conference on Computer and communications security (CCS '06)
, pp. 168-178
-
-
Brainard, J.1
Juels, A.2
Rivest, R.L.3
Szydlo, M.4
Yung, M.5
-
12
-
-
34548344520
-
-
APWG
-
APWG "Phishing Activity Trend". http://www.antiphishing.org/ reports/apwg_report_march_2007.pdf
-
Phishing Activity Trend
-
-
-
13
-
-
47849103668
-
-
Nokia. Nokia N73 Device Features, http://www.nokiausa.com/phones/N73/0, 7747,feat:1,00.html.
-
Nokia. Nokia N73 Device Features, http://www.nokiausa.com/phones/N73/0, 7747,feat:1,00.html.
-
-
-
-
14
-
-
47849119676
-
-
http://www.51logon.com/.
-
-
-
-
15
-
-
47849115811
-
-
MPWG https://www.trustedcomputinggroup.org/groups/mobile.
-
MPWG https
-
-
|