-
1
-
-
85081499361
-
-
T. Dierks and C. Allen. The TLS Protocol, Version 1.0. IETF RFC 2246,January 1999
-
T. Dierks and C. Allen. The TLS Protocol - Version 1.0. IETF RFC 2246,January 1999.
-
-
-
-
2
-
-
85081514556
-
-
http://en.wikipedia.org/wiki/Phishing
-
-
-
-
3
-
-
85081493394
-
-
Anti-phishing working group
-
Anti-phishing working group. http://www.antiphishing.org.
-
-
-
-
4
-
-
85081507655
-
-
http://en.wikipedia.org/wiki/Key_logger
-
-
-
-
5
-
-
85081519990
-
-
http://www.eweek.com/article2/0,1895,1940623,00.asp
-
http://www.eweek.com/article2/0,1895,1940623,00.asp
-
-
-
-
6
-
-
33244477163
-
Stronger Password Authentication Using Browser Extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, J. Mitchell, "Stronger Password Authentication Using Browser Extensions," Proceedings of 14th USENIX Security Symposium.
-
Proceedings of 14th USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
7
-
-
85081508858
-
-
E. Gaber, P. Gobbons, Y. Mattias, and A. Mayer, How to make personalized web browsing simple, secure, and anonymous, Proceedings of Financial Crypto '97, 1318 of LNCS.Springer-Verlag, 1997.
-
E. Gaber, P. Gobbons, Y. Mattias, and A. Mayer, "How to make personalized web browsing simple, secure, and anonymous," Proceedings of Financial Crypto '97, volume 1318 of LNCS.Springer-Verlag, 1997.
-
-
-
-
8
-
-
84949287358
-
On secure and pseudonymous user-relationships with multiple servers
-
E. Gabber, P. Gibbons, D. Kristol, Y. Matias, and A. Mayer, "On secure and pseudonymous user-relationships with multiple servers," ACM Transactions on Information and System Security, 2(4):390-415, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 390-415
-
-
Gabber, E.1
Gibbons, P.2
Kristol, D.3
Matias, Y.4
Mayer, A.5
-
10
-
-
85081516142
-
-
J. la Poutr? e, Password composer, http://www.xs4all.nl/? jlpoutre/BoT/Javascript/PasswordComposer/.
-
J. la Poutr? e, "Password composer," http://www.xs4all.nl/? jlpoutre/BoT/Javascript/PasswordComposer/.
-
-
-
-
13
-
-
85081517630
-
-
http://www.bell-labs.com/project/lpwa/
-
-
-
-
15
-
-
44649109729
-
System and method for generating unique passwords,
-
US Patent 6,141,760
-
M. Abadi, L. Bharat, and A. Marais, "System and method for generating unique passwords," US Patent 6,141,760, 1997.
-
(1997)
-
-
Abadi, M.1
Bharat, L.2
Marais, A.3
-
18
-
-
85081512111
-
-
http://www.citibank.co.jp/en/service/cap/virtualpad/
-
-
-
-
19
-
-
85081524315
-
-
http://obr.typepad.com/financial_innovations/2005/11/ing_direct_adds.html
-
-
-
-
20
-
-
14844300740
-
Schwächen des ec-PIN-Verfahrens. Available at http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller, Feb
-
Manuscript
-
MÖLLER, B. Schwächen des ec-PIN-Verfahrens. Available at http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller, Feb. 1997. Manuscript.
-
(1997)
-
-
MÖLLER, B.1
-
21
-
-
34250765199
-
Trustbar: Protecting (even naive) web users from spoofing and phishing attacks
-
Cryptology ePrint Archive, Report 2004/155
-
A. Herzberg and A. Gbara, "Trustbar: Protecting (even naive) web users from spoofing and phishing attacks," Cryptology ePrint Archive, Report 2004/155, 2004. http://eprint.iacr.org/2004/155.
-
(2004)
-
-
Herzberg, A.1
Gbara, A.2
-
22
-
-
84902214998
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
Venezia, Italy
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," Proc. of the working conference on Advanced visual interfaces,Venezia, Italy.
-
Proc. of the working conference on Advanced visual interfaces
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.4
-
23
-
-
14844314151
-
A PIN-entry method resilient against shoulder-surfing
-
V. Roth, K. Richter, and R. Freidinger, "A PIN-entry method resilient against shoulder-surfing," Proc. of the 11th ACM Conference on Computer and Communications Security, 2004,236-245.
-
(2004)
Proc. of the 11th ACM Conference on Computer and Communications Security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
25
-
-
85180411878
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage," Proceedings of the 12th Annual Network and Distributed System Security Symposium,2005.
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
26
-
-
51249085579
-
Method and apparatus for secure PIN entry,
-
US Patent #5,940,511, United States Patent and Trademark Office, May 1997. Assignee: Lucent Technologies, Inc, Murray Hill, NJ
-
G. T. Wilfong, "Method and apparatus for secure PIN entry," US Patent #5,940,511, United States Patent and Trademark Office, May 1997. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ).
-
-
-
Wilfong, G.T.1
-
29
-
-
85081510599
-
A Bayesian Approach to Filtering Junk E-Mail.In Learning for Text Categorization
-
May
-
M. Sahami, S. Dumais, D. Heckerman, and E.Horvitz, "A Bayesian Approach to Filtering Junk E-Mail.In Learning for Text Categorization," The 1998 Workshop, May 1998
-
(1998)
The 1998 Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
30
-
-
13944276290
-
SpamBayes: Effective open-source, Bayesian based, email classification system
-
T.A. Meyer and B. Whateley, "SpamBayes: Effective open-source, Bayesian based, email classification system," Proc. of CEAS 2004.
-
(2004)
Proc. of CEAS
-
-
Meyer, T.A.1
Whateley, B.2
-
32
-
-
85081493380
-
-
The Spamhaus Project, List
-
The Spamhaus Project. The Spamhaus Block List.http://www.spamhaus.org/ sbl/.
-
The Spamhaus Block
-
-
-
33
-
-
84929156350
-
-
Netcraft. Anti-Phishing Toolbar. http://news.netcraft.com/archives/2004/ 12/28/netcraft_antiphishing_tool%bar_available_for_download.html.
-
Anti-Phishing Toolbar
-
-
-
34
-
-
51249086645
-
Secret Little Functions and Codebook for Protecting Users from Password Theft
-
Y. Xiao, C.-C. Li, M. Lei, and S. V. Vrbsky, "Secret Little Functions and Codebook for Protecting Users from Password Theft," Proc. of IEEE ICC 2008.
-
(2008)
Proc. of IEEE
, vol.199
-
-
Xiao, Y.1
Li, C.-C.2
Lei, M.3
Vrbsky, S.V.4
|