-
1
-
-
51849153945
-
BeamAuth: Two-factor web authentication with a bookmark
-
B. Adida. BeamAuth: Two-factor web authentication with a bookmark. In Proceedings of the CCS, pages 48-57, 2007.
-
(2007)
Proceedings of the CCS
, pp. 48-57
-
-
Adida, B.1
-
2
-
-
60649118511
-
Phishing phishers - tracing identity thieves and money launderer
-
Technical Report, Horst-Görtz Institute of Ruhr-University of Bochum
-
D. Birk, M. Dornseif, S. Gajek, and F. Gröbert. Phishing phishers - tracing identity thieves and money launderer. Technical Report, Horst-Görtz Institute of Ruhr-University of Bochum, 2006.
-
(2006)
-
-
Birk, D.1
Dornseif, M.2
Gajek, S.3
Gröbert, F.4
-
3
-
-
35348884907
-
Exposing private information by timing web applications
-
A. Bortz, D. Boneh, and P. Nandy. Exposing private information by timing web applications. In Proceedings of the WWW, pages 621-628, 2007.
-
(2007)
, pp. 621-628
-
-
Bortz, A.1
Boneh, D.2
Nandy, P.3
-
5
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
R. Dhamija and J.D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the SOUPS, pages 77-88, 2005.
-
(2005)
Proceedings of the SOUPS
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
7
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
S. Egelman, L. F. Cranor, and J. Hong. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the CHI, pages 1065-1074, 2008.
-
(2008)
Proceedings of the CHI
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
9
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florêncio and C. Herley. A large-scale study of web password habits. In Proceedings of the WWW, pages 657-666, 2007.
-
(2007)
, pp. 657-666
-
-
Florêncio, D.1
Herley, C.2
-
12
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
14
-
-
34249852316
-
Designing ethical phishing experiments: A study of (ROT13) rOnl query features
-
M. Jakobsson and J. Ratkiewicz. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the WWW, pages 513-522, 2006.
-
(2006)
, pp. 513-522
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
16
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nung. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the CHI, pages 905-914, 2007.
-
(2007)
Proceedings of the CHI
, pp. 905-914
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nung, E.6
-
20
-
-
0038687701
-
Securing passwords against dictionary attacks
-
B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In Proceedings of the CCS, pages 161-170, 2002.
-
(2002)
Proceedings of the CCS
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
21
-
-
33745816410
-
-
Rachna Dhamija and J.D. Tygar and Marti Hearst. Why phishing works. In Proceedings of the CHI, pages 581-590, 2006.
-
Rachna Dhamija and J.D. Tygar and Marti Hearst. Why phishing works. In Proceedings of the CHI, pages 581-590, 2006.
-
-
-
-
22
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the USENIX Security Symposium, pages 17-32, 2005.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 17-32
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
23
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy, pages 51-65, 2007.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
24
-
-
36849073159
-
Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the SOUPS, pages 88-99, 2007.
-
(2007)
Proceedings of the SOUPS
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
25
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In Proceedings of the Eurocrypt, pages 294-311, 2003.
-
(2003)
Proceedings of the Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
28
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the CHI, pages 601-610, 2006.
-
(2006)
Proceedings of the CHI
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
29
-
-
34250786200
-
Web Wallet: Preventing phishing attacks by revealing user intentions
-
M. Wu, R. C. Miller, and G. Little. Web Wallet: preventing phishing attacks by revealing user intentions. In Proceedings of the SOUPS, pages 102-113, 2006.
-
(2006)
Proceedings of the SOUPS
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
31
-
-
34250747969
-
Passpet: Convenient password management and phishing protection
-
K.-P. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In Proceedings of the SOUPS, pages 32-43, 2006.
-
(2006)
Proceedings of the SOUPS
, pp. 32-43
-
-
Yee, K.-P.1
Sitaker, K.2
-
33
-
-
35348905575
-
CANTINA: A content-based approach to detecting phishing web sites
-
Y. Zhang, J. Hong, and L. Cranor. CANTINA: A content-based approach to detecting phishing web sites. In Proceedings of the WWW, pages 639-648, 2007.
-
(2007)
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
41
-
-
84868897722
-
-
PhishTank. http://www.phishtank.com/.
-
PhishTank
-
-
|