메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 47-61

Minimizing SSO effort in verifying SSL anti-phishing indicators

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTER CRIME;

EID: 48249105468     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_4     Document Type: Conference Paper
Times cited : (6)

References (37)
  • 5
    • 48349121472 scopus 로고    scopus 로고
    • Using Java in anti DNS-pinning attacks
    • 1566124/,February2007
    • Martin Johns, "Using Java in anti DNS-pinning attacks," http://shampoo.antville.org/stories/1566124/,February2007.
    • Johns, M.1
  • 6
    • 25144432071 scopus 로고    scopus 로고
    • Phishing Attack Victims Likely Targets for Identity Theft
    • Gartner Research
    • Avivah Litan, "Phishing Attack Victims Likely Targets for Identity Theft," in Gartner First Take FT-22-8873. 2004, Gartner Research
    • (2004) Gartner First Take FT-22-8873
    • Litan, A.1
  • 7
    • 48249132176 scopus 로고    scopus 로고
    • Microsoft. Microsoft security bulletin MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard,March 2001. http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx
    • Microsoft. Microsoft security bulletin MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard,March 2001. http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx
  • 9
    • 48249116513 scopus 로고    scopus 로고
    • Russell Housley, Warwick Ford, Tim Polk, and David Solo, Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile, 2002. http://tools.ietf.org/html/rfc3280
    • Russell Housley, Warwick Ford, Tim Polk, and David Solo, "Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile," 2002. http://tools.ietf.org/html/rfc3280
  • 10
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications using static analysis
    • V. Benjamin Livshits, and Monica S. Lam, "Finding security vulnerabilities in Java applications using static analysis," USENIX Security Sym., pp.271-286, 2005.
    • (2005) USENIX Security Sym , pp. 271-286
    • Benjamin Livshits, V.1    Lam, M.S.2
  • 12
    • 48249153527 scopus 로고    scopus 로고
    • mozilla.dev.security, VeriSign Class 3 Secure Server CA?, http://groups.google.com/group/mozilla.dev.security/browse_thread/ threa%d/6830a8566de24547/0be9dea1c274d0c5, March 2007.
    • mozilla.dev.security, "VeriSign Class 3 Secure Server CA?," http://groups.google.com/group/mozilla.dev.security/browse_thread/ threa%d/6830a8566de24547/0be9dea1c274d0c5, March 2007.
  • 13
    • 48249119288 scopus 로고    scopus 로고
    • A. Freier, P. Kariton, and P. Kocher, The SSL Protocol: Version 3.0, Netscape communications, Inc, 1996
    • A. Freier, P. Kariton, and P. Kocher, "The SSL Protocol: Version 3.0," Netscape communications, Inc., 1996.
  • 14
    • 0242277405 scopus 로고    scopus 로고
    • Trust on Web Browser: Attack vs. Defense
    • First MiAn International Conference on Applied Cryptography and Network Security
    • Tieyan Li, and Yongdong Wu, "Trust on Web Browser: Attack vs. Defense," First MiAn International Conference on Applied Cryptography and Network Security, LNCS 2846, pp.241-253, 2003.
    • (2003) LNCS , vol.2846 , pp. 241-253
    • Li, T.1    Wu, Y.2
  • 15
    • 48249105616 scopus 로고    scopus 로고
    • Covert Distributed Computing Using Java Through Web Spoofing
    • Jeffrey Horton, and Jennifer Seberry, "Covert Distributed Computing Using Java Through Web Spoofing," ACISP, pp.48-57, 1998. http://www.uow.edu.au/jennie/WEB/JavaDistComp.ps.
    • (1998) ACISP , pp. 48-57
    • Horton, J.1    Seberry, J.2
  • 19
    • 48249096088 scopus 로고    scopus 로고
    • Security Space and E-Soft, Secure Server Survey, http://www.securityspace.com/_survey/sdata/200704/certca.html, May 2007.
    • Security Space and E-Soft, "Secure Server Survey," http://www.securityspace.com/_survey/sdata/200704/certca.html, May 2007.
  • 23
    • 48249092161 scopus 로고    scopus 로고
    • RSA Security Inc
    • RSA Security Inc, "SecurID product description," http://rsasecurity.com/node.asp?id=1156.
    • SecurID product description
  • 25
    • 84958955276 scopus 로고    scopus 로고
    • M. Burnside, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, and Ronald Rivest, The untrusted computer prolem and camera-based authentication, International Conference on Pervasive Computing, LNCS 2414, pp.114-124, 2002.
    • M. Burnside, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, and Ronald Rivest, "The untrusted computer prolem and camera-based authentication," International Conference on Pervasive Computing, LNCS 2414, pp.114-124, 2002.
  • 26
    • 48249155513 scopus 로고    scopus 로고
    • Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, and Marten van Dijk, Visual Crypto Displays enabling Secure Communications, Proceeding of First International Conference on Security in Pervasive Computing, pp.12-14, 2003.
    • Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, and Marten van Dijk, "Visual Crypto Displays enabling Secure Communications," Proceeding of First International Conference on Security in Pervasive Computing, pp.12-14, 2003.
  • 29
    • 48249084321 scopus 로고    scopus 로고
    • J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. http Authentication: Basic and Digest Access Authentication, June 1999. http://www.ietf.org/rfc/rfc2617.txt.
    • J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. http Authentication: Basic and Digest Access Authentication, June 1999. http://www.ietf.org/rfc/rfc2617.txt.
  • 31
    • 24644478206 scopus 로고    scopus 로고
    • Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
    • Information Security Practice and ExperienceISPEC
    • Andre Adelsbach, Sebastian Gajek, and Jorg Schwenk, "Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures," Information Security Practice and Experience(ISPEC), LNCS 3469, pp.204-216, 2005.
    • (2005) LNCS , vol.3469 , pp. 204-216
    • Adelsbach, A.1    Gajek, S.2    Schwenk, J.3
  • 32
    • 33745599108 scopus 로고    scopus 로고
    • Preventing Web-Spoofing with Automatic Detecting Security Indicator, ISPEC
    • Fang Qi, Tieyan Li, Feng Bao, and Yongdong Wu, "Preventing Web-Spoofing with Automatic Detecting Security Indicator," ISPEC, LNCS 3903, pp. 112-122, 2006.
    • (2006) LNCS , vol.3903 , pp. 112-122
    • Qi, F.1    Li, T.2    Bao, F.3    Wu, Y.4
  • 37
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. H. Saltzer, and M. D. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE, 63(9 :1278-308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.