-
1
-
-
56649088444
-
-
http://labs.zarate.org/passwd/
-
-
-
-
2
-
-
56649120790
-
-
http://www.cl.cam.ac.uk/~mgk25/otpw.html
-
-
-
-
3
-
-
56649105443
-
-
http://www.rsasecurity.com
-
-
-
-
4
-
-
56649100879
-
-
http://www.kyps.net
-
-
-
-
5
-
-
56649089981
-
-
http://www.csoft.co.uk/sms/character_sets/encoding.htm
-
-
-
-
6
-
-
56649108315
-
-
http://www.jmarshall.com/tools/cgiproxy
-
-
-
-
7
-
-
56649091507
-
-
http://www.clickatell.com
-
-
-
-
8
-
-
56649088443
-
-
http://www.fiddlertool.com
-
-
-
-
9
-
-
56649085425
-
-
http://www.xk72.com/charles/
-
-
-
-
10
-
-
56649113128
-
-
http://www.portswigger.net/proxy
-
-
-
-
11
-
-
56649106757
-
-
Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
-
Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
-
-
-
-
12
-
-
70450252840
-
Johnny Can Obfuscate: Beyond Mother's Maiden Name
-
Cheswick, W.: Johnny Can Obfuscate: Beyond Mother's Maiden Name. In: Proc. Usenix HotSec (2006)
-
(2006)
Proc. Usenix HotSec
-
-
Cheswick, W.1
-
13
-
-
56649111144
-
-
Coskun, B., Herley, C.: Can Something You Know be Saved? In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, 5222, pp. 421-440. Springer, Heidelberg (2008)
-
Coskun, B., Herley, C.: Can "Something You Know" be Saved? In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 421-440. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
35348884906
-
A Large-Scale Study of Web Password Habits
-
Banff
-
Florêncio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: WWW 2007, Banff (2007)
-
(2007)
WWW
-
-
Florêncio, D.1
Herley, C.2
-
15
-
-
56649103994
-
-
Florêncio, D., Herley, C.: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
-
Florêncio, D., Herley, C.: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
0003317098
-
How to make personalized web browsing simple, secure and anonymous
-
Gaber, E., Gibbons, P., Matyas, Y., Mayer, A.: How to make personalized web browsing simple, secure and anonymous. In: Proc. Finan. Crypto 1997 (1997)
-
(1997)
Proc. Finan. Crypto
-
-
Gaber, E.1
Gibbons, P.2
Matyas, Y.3
Mayer, A.4
-
20
-
-
84856038557
-
Phishing as a Tragedy of the Commons
-
Lake Tahoe, CA
-
Herley, C., Florêncio, D.: Phishing as a Tragedy of the Commons. In: NSPW 2008, Lake Tahoe, CA (2008)
-
(2008)
NSPW
-
-
Herley, C.1
Florêncio, D.2
-
21
-
-
56649106747
-
-
Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K., Venkasubramanian, N.: Delegate: A Proxy based Architecture fort Secure Website Access from an Untrusted Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
-
Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K., Venkasubramanian, N.: Delegate: A Proxy based Architecture fort Secure Website Access from an Untrusted Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM (1981)
-
(1981)
Communications of the ACM
-
-
Lamport, L.1
-
23
-
-
0003882874
-
-
Prentice-Hall, Englewood Cliffs
-
Luotonen, A.: Web Proxy Servers. Prentice-Hall, Englewood Cliffs (1998)
-
(1998)
Web Proxy Servers
-
-
Luotonen, A.1
-
24
-
-
38549118817
-
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
-
Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
-
Mannan, M., van Oorschot, P.C.: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
-
-
Mannan, M.1
van Oorschot, P.C.2
-
26
-
-
56649113127
-
-
Mao, Z, Herley, C, Robust Reverse Proxy Implementation. MSR.-TR
-
Mao, Z., Herley, C.: Robust Reverse Proxy Implementation. MSR.-TR
-
-
-
-
28
-
-
3042844145
-
Photographic Authentication through Untrusted Terminals
-
Pering, T., Sundar, M., Light, J., Want, R.: Photographic Authentication through Untrusted Terminals. IEEE Security and Privacy (2003)
-
(2003)
IEEE Security and Privacy
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
30
-
-
0004015324
-
-
Prentice-Hall, Englewood Cliffs
-
Bell, T.C., Cleary, J.G., Witten, I.H.: Text Compression. Prentice-Hall, Englewood Cliffs (1990)
-
(1990)
Text Compression
-
-
Bell, T.C.1
Cleary, J.G.2
Witten, I.H.3
-
31
-
-
56649089975
-
Spy-resistant keyboard: More secure password entry on public touch screen displays
-
Tan, D., Keryana, P., Czerwinski, M.: Spy-resistant keyboard: more secure password entry on public touch screen displays. In: CHISIG 2005 (2005)
-
(2005)
CHISIG
-
-
Tan, D.1
Keryana, P.2
Czerwinski, M.3
-
32
-
-
33751057130
-
Cognitive Authentication Schemes Safe Against Spyware
-
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware. In: Symp. on Security and Privacy (2006)
-
(2006)
Symp. on Security and Privacy
-
-
Weinshall, D.1
|