-
1
-
-
34548344520
-
-
ANTI-PHISHING WORKING GROUP
-
ANTI-PHISHING WORKING GROUP. 2006. Phishing activity trends report. http://www.antiphishing.org/reports/ apwg_report_May2006.pdf.
-
(2006)
Phishing activity trends report
-
-
-
2
-
-
54049156094
-
-
ANTI-PHISHING WORKING GROUP
-
ANTI-PHISHING WORKING GROUP. 2005. Phishing archive. http://www.antiphishing.org/.
-
(2005)
Phishing archive
-
-
-
3
-
-
14544299579
-
-
BONEH, D., SHACHAM, H., AND RESCROLA, E. 2004. Client side caching for TLS. ACM Trans. Inf. Syst. Security 7, 4 (Nov.), 553-575.
-
BONEH, D., SHACHAM, H., AND RESCROLA, E. 2004. Client side caching for TLS. ACM Trans. Inf. Syst. Security 7, 4 (Nov.), 553-575.
-
-
-
-
5
-
-
54049124489
-
-
ITIBANK CORPORATION
-
ITIBANK CORPORATION. 2004. Learn about or report fraudulent e-mails, http://www.citibank.coin/domain/spoof/report_abuse.htm.
-
(2004)
Learn about or report fraudulent e-mails
-
-
-
6
-
-
54049112231
-
Petname tool: Enabling Web site recognition using the existing SSL infrastructure
-
LOSE, T. 2006. Petname tool: Enabling Web site recognition using the existing SSL infrastructure. In W3C Workshop on Transparency and Usability of Web Authentication, http://www.w3.org/2005/Security/usability- ws/papers/02-hp-petname/.
-
(2006)
W3C Workshop on Transparency and Usability of Web Authentication
-
-
LOSE, T.1
-
8
-
-
33745816410
-
Why phishing works
-
Montreal, Quebec, Canada
-
HAMIJA, R., TYGAR, J. D., AND HEARST, M. 2006. Why phishing works. In Proceedings of the Conference on Human Factors in Computing Systems (CHI), Montreal, Quebec, Canada, 581-590.
-
(2006)
Proceedings of the Conference on Human Factors in Computing Systems (CHI)
, pp. 581-590
-
-
HAMIJA, R.1
TYGAR, J.D.2
HEARST, M.3
-
9
-
-
0033295882
-
The nature of a usable PKI
-
ELLISON, C. 1999. The nature of a usable PKI. Comput. Netw. 31, 823-830.
-
(1999)
Comput. Netw
, vol.31
, pp. 823-830
-
-
ELLISON, C.1
-
10
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
ELLISON, C. AND SCHNEIER, B. 2000. Ten risks of PKI: What you're not being told about public key infrastructure. Comput. Security J. 16, 1, 1-7. http://www.schneier.com/paper-pki.html.
-
(2000)
Comput. Security J
, vol.16
, Issue.1
, pp. 1-7
-
-
ELLISON, C.1
SCHNEIER, B.2
-
11
-
-
0003593599
-
-
Internet RFC 2693, Internet Engineering Task Force. September
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. SPKI certificate theory. Internet RFC 2693, Internet Engineering Task Force. September. http://research. microsoft.com/Lampson/62-SPKICertificateTheory/ Abstract.html.
-
(1999)
SPKI certificate theory
-
-
ELLISON, C.1
FRANTZ, B.2
LAMPSON, B.3
RIVEST, R.4
THOMAS, B.5
YLONEN, T.6
-
12
-
-
54049088937
-
-
EMIGH, A. 2005. Online identity theft: Technology, chokepoints and countermeasures. Rep., Department of Homeland Security- SRI International Identity Theft Technology Council. October. http://www.antiphishing.org/ Phishing-dhs-report.pdf.
-
EMIGH, A. 2005. Online identity theft: Technology, chokepoints and countermeasures. Rep., Department of Homeland Security- SRI International Identity Theft Technology Council. October. http://www.antiphishing.org/ Phishing-dhs-report.pdf.
-
-
-
-
13
-
-
54049112229
-
-
FELTEN, E. W., BALFANZ, D., DEAN, D., AND WALLACH, D. S. 1997. Web spoofing: An Internet con game. In Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD. Also Tech. Rep. 540-96, Department of Computer Science, Princeton University. October.
-
FELTEN, E. W., BALFANZ, D., DEAN, D., AND WALLACH, D. S. 1997. Web spoofing: An Internet con game. In Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD. Also Tech. Rep. 540-96, Department of Computer Science, Princeton University. October.
-
-
-
-
14
-
-
70349318955
-
Better Website identification and extended validation certificates in IE7 and other browsers
-
FRANCO, R. 2004. Better Website identification and extended validation certificates in IE7 and other browsers. In Microsoft Developer Network's IEBlog. http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx.
-
(2004)
Microsoft Developer Network's IEBlog
-
-
FRANCO, R.1
-
15
-
-
85084161244
-
Do's and don'ts of client authentication on the Web
-
Washington, DC
-
Fu, K., SIT, E., SMITH, K., AND FEAMSTER, N. 2001. Do's and don'ts of client authentication on the Web. In Proceedings of the 10th USENIX Security Symposium, Washington, DC.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Fu, K.1
SIT, E.2
SMITH, K.3
FEAMSTER, N.4
-
17
-
-
54049136023
-
Method and apparatus for authentication of users and Web sites
-
U.S. patent number 7100049
-
GASPARINI, L. A. AND GOTLIEB, C. E. 2006. Method and apparatus for authentication of users and Web sites. U.S. patent number 7100049.
-
(2006)
-
-
GASPARINI, L.A.1
GOTLIEB, C.E.2
-
18
-
-
54049155721
-
-
personal communication
-
GRIGG, I. 2004a. personal communication.
-
(2004)
-
-
GRIGG, I.1
-
24
-
-
0038442927
-
Payments and banking with mobile personal devices
-
HERZBERG, A. 2003. Payments and banking with mobile personal devices. Commun. ACM 46, 5, 53-58.
-
(2003)
Commun. ACM
, vol.46
, Issue.5
, pp. 53-58
-
-
HERZBERG, A.1
-
25
-
-
54049136471
-
-
HERZBERG, A. AND JBARA, A. 2004. TrustBar: Protecting (even naïve) Web users from spoofing and phishing attacks. Rep. 2004/155, Cryptology ePrint Archive. http://eprint.iacr.org.
-
HERZBERG, A. AND JBARA, A. 2004. TrustBar: Protecting (even naïve) Web users from spoofing and phishing attacks. Rep. 2004/155, Cryptology ePrint Archive. http://eprint.iacr.org.
-
-
-
-
26
-
-
0031676704
-
Surf'n'Sign: Client signatures on Web documents
-
HERZBERG, A. AND NAOR, D. 1998. Surf'n'Sign: Client signatures on Web documents. IBM Syst. J. 37, 1, 61-71.
-
(1998)
IBM Syst. J
, vol.37
, Issue.1
, pp. 61-71
-
-
HERZBERG, A.1
NAOR, D.2
-
27
-
-
54049083807
-
-
JACKSON, C., SIMON, D., TAN, D., AND BARTH, A. 2007. An evaluation of extended validation and picture-in-picture phishing attacks, http://usablesecurity.org/papers/jackson. pdf.
-
(2007)
An evaluation of extended validation and picture-in-picture phishing attacks
-
-
JACKSON, C.1
SIMON, D.2
TAN, D.3
BARTH, A.4
-
31
-
-
54049142454
-
Authentication for humans
-
B. Gavish, ed. Cox School of Business, Southern Methodist University, Dallas, TX
-
JØSANG, A., PATTON, M. A., AND HO, A. 2001. Authentication for humans. In Proceedings of the 9th International Conference on Telecommunication Systems (ICTS), B. Gavish, ed. Cox School of Business, Southern Methodist University, Dallas, TX.
-
(2001)
Proceedings of the 9th International Conference on Telecommunication Systems (ICTS)
-
-
JØSANG, A.1
PATTON, M.A.2
HO, A.3
-
32
-
-
0033749074
-
Reasoning about public-key certification: On bindings between entities and public keys
-
Apr
-
KOHLAS AND MAURER, U. 2000. Reasoning about public-key certification: On bindings between entities and public keys. IEEE J. Selected Areas Commun. 18, 4 (Apr.).
-
(2000)
IEEE J. Selected Areas Commun
, vol.18
, pp. 4
-
-
KOHLAS1
MAURER, U.2
-
33
-
-
0033719386
-
Risks of the passport single signon protocol
-
Jul
-
KORMANN, D. P. AND RUBIN, A. D. 2000. Risks of the passport single signon protocol. Comput. Netw. (Jul.).
-
(2000)
Comput. Netw
-
-
KORMANN, D.P.1
RUBIN, A.D.2
-
34
-
-
0005826403
-
SEMPER - Secure Electronic Marketplace for Europe
-
ACOSTE, G, PFITZMANN, B, STEINER, M, AND WAIDNER, M, eds, Springer
-
ACOSTE, G., PFITZMANN, B., STEINER, M., AND WAIDNER, M., eds. 2000. SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science, vol. 1854. Springer.
-
(2000)
Lecture Notes in Computer Science
, vol.1854
-
-
-
35
-
-
35248863938
-
Cut-and-Paste attacks with Java
-
Proceedings of the 5th International Conference on Information Security and Cryptology ICISC, Springer
-
EFRANC, S. AND NACCACHE, D. 2003. Cut-and-Paste attacks with Java. In Proceedings of the 5th International Conference on Information Security and Cryptology (ICISC). Lecture Notes in Computer Science, vol. 2587. Springer, 1-15.
-
(2003)
Lecture Notes in Computer Science
, vol.2587
, pp. 1-15
-
-
EFRANC, S.1
NACCACHE, D.2
-
36
-
-
0242277405
-
Trust on Web browser: Attack vs. defense
-
Proceedings of the International Conference on Applied Cryptography and Network Security ACNS, Kunming, Springer
-
I, T. AND YONGDONG, W. 2003. Trust on Web browser: Attack vs. defense. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), Kunming, China. Lecture Notes in Computer Science, Springer.
-
(2003)
China. Lecture Notes in Computer Science
-
-
LI, T.1
YONGDONG, W.2
-
37
-
-
25144432071
-
Phishing attack victims likely targets for identity theft
-
Gartner Research. May
-
ITAN, A. 2004. Phishing attack victims likely targets for identity theft. Gartner FirstTake Rep. FT-22-8873. Gartner Research. May.
-
(2004)
Gartner FirstTake Rep. FT-22-8873
-
-
ITAN, A.1
-
40
-
-
33645418328
-
-
ICROSOFT CORPORATION
-
ICROSOFT CORPORATION. 2004. The coordinated spam reduction initiative. http://www.microsoft.com/downloads/details.aspx?familyid= 5577782e-462d-4bbe-92e5-b38c575229e4&sdisplaylang=en.
-
(2004)
The coordinated spam reduction initiative
-
-
-
42
-
-
0004257599
-
-
Academic Press, Boston, MA. ISBN 0-12-518405-0
-
NIELSEN, J. 1993. Usability Engineering. Academic Press, Boston, MA. ISBN 0-12-518405-0.
-
(1993)
Usability Engineering
-
-
NIELSEN, J.1
-
43
-
-
0037844764
-
Trustworthy user devices
-
G. Muller and K. Rannenberg, eds. Addison-Wesley
-
PFTIZMANN, A., PFTIZMANN, B., SCHUNTER, M., AND WAIDNER, M. 1999. Trustworthy user devices. In Multilateral Security in Communications, G. Muller and K. Rannenberg, eds. Addison-Wesley, 137-156.
-
(1999)
Multilateral Security in Communications
, pp. 137-156
-
-
PFTIZMANN, A.1
PFTIZMANN, B.2
SCHUNTER, M.3
WAIDNER, M.4
-
44
-
-
54049157428
-
-
Earlier version: Trusting mobile user devices and security modules. IEEE Comput. 30, 2 (Feb.), 61-68.
-
Earlier version: Trusting mobile user devices and security modules. IEEE Comput. 30, 2 (Feb.), 61-68.
-
-
-
-
47
-
-
54049130821
-
-
SANTESSON, S., HOUSLEY, R., AND FREEMAN, T 2004. Internet X.509 public key infrastructure: Logotypes in X.509 certificates. Internet RFC 3709, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3709.txt.
-
SANTESSON, S., HOUSLEY, R., AND FREEMAN, T 2004. Internet X.509 public key infrastructure: Logotypes in X.509 certificates. Internet RFC 3709, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3709.txt.
-
-
-
-
48
-
-
74049155648
-
The emperor's new security indicators
-
to appear
-
SCHECHTER, S., DHAMIJA, R., OZMENT, A., AND FISCHER, I. 2007. The emperor's new security indicators. In Proceedings of the IEEE Symposium on Security and Privacy, to appear.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
SCHECHTER, S.1
DHAMIJA, R.2
OZMENT, A.3
FISCHER, I.4
-
49
-
-
33745608769
-
Multiple browser URI display obfuscation weakness
-
SECURITY FOCUS. 2003. Multiple browser URI display obfuscation weakness. http://www.securityfocus.com/bid/9182/discussion/.
-
(2003)
-
-
-
54
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
Montreal, Quebec, Canada
-
Wu, M., MILLER, R. C., AND GARFINKEL, S. L. 2006. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montreal, Quebec, Canada, 601-610.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
MILLER, R.C.2
GARFINKEL, S.L.3
-
55
-
-
54049089216
-
-
YAHOO, INCORPORATED. 2006. Give password scams the boot with personalized sign-in seals. https://protect.login.yahoo.com/.
-
YAHOO, INCORPORATED. 2006. Give password scams the boot with personalized sign-in seals. https://protect.login.yahoo.com/.
-
-
-
-
56
-
-
23244459906
-
-
YE, E. Z., YUAN, Y., AND ANTHONY, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Security 8, 2 (May), 153-186.
-
YE, E. Z., YUAN, Y., AND ANTHONY, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Security 8, 2 (May), 153-186.
-
-
-
-
57
-
-
2642577193
-
Web spoofing revisited: SSL and beyond
-
Tech. Rep. TR2002-417. February
-
YE, E. Z., YUAN, Y., AND SMITH, S. 2002. Web spoofing revisited: SSL and beyond. Tech. Rep. TR2002-417. February.
-
(2002)
-
-
YE, E.Z.1
YUAN, Y.2
SMITH, S.3
-
58
-
-
54049149759
-
User interaction design for secure systems
-
Tech. Rep. CSD-02-1184, University of California, Berkeley. May
-
YEE, K. P. 2002. User interaction design for secure systems. Tech. Rep. CSD-02-1184, University of California, Berkeley. May.
-
(2002)
-
-
YEE, K.P.1
|