-
2
-
-
85044841595
-
Client-side defense against web-based identity theft
-
San Diego, Feb
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell. Client-side defense against web-based identity theft. In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, Feb. 2004.
-
(2004)
11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
3
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM Press
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590, New York, NY, USA, 2006. ACM Press.
-
(2006)
CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
62849097194
-
Ssl-vaauthentifizierung als schutz von phishing und pharming.
-
S. Gajek, J. Schwenk, and C. Wegener. Ssl-vaauthentifizierung als schutz von phishing und pharming. In Sicherheit, pages 6-17, 2006.
-
(2006)
Sicherheit
, pp. 6-17
-
-
Gajek, S.1
Schwenk, J.2
Wegener, C.3
-
8
-
-
62849098625
-
-
Microsoft. Bitlocker drive encryption: Executive overview, 2006. available at http://technet.microsoft.com/en-us/windowsvista/aa906018.aspx, last visited July 2007.
-
Microsoft. Bitlocker drive encryption: Executive overview, 2006. available at http://technet.microsoft.com/en-us/windowsvista/aa906018.aspx, last visited July 2007.
-
-
-
-
9
-
-
84879873388
-
A proof of concept implementation of ssl/tls session aware user authentication (tls-sa)
-
T. Braun, G. Carle, and B. Stiller, editors, Springer Verlag
-
R. Oppliger, R. Hauser, D. Basin, A. Rodenhaeuser, and B. Kaiser. A proof of concept implementation of ssl/tls session aware user authentication (tls-sa). In T. Braun, G. Carle, and B. Stiller, editors, Kommunikation in Verteilten Systemen, Informatik Aktuell, pages 225-236. Springer Verlag, 2007.
-
(2007)
Kommunikation in Verteilten Systemen, Informatik Aktuell
, pp. 225-236
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
Rodenhaeuser, A.4
Kaiser, B.5
-
11
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th Usenix Security Symposium, 2005.
-
(2005)
Proceedings of the 14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
12
-
-
1142270162
-
-
Prentice Hall
-
S. Pearson, B. Balacheff, L. Chen, D. Plaquin, and G. Proudler. Trusted Computing Platforms. TCPA Technology in Context. Prentice Hall, 2003.
-
(2003)
Trusted Computing Platforms. TCPA Technology in Context
-
-
Pearson, S.1
Balacheff, B.2
Chen, L.3
Plaquin, D.4
Proudler, G.5
-
14
-
-
33845575417
-
-
The Trusted Computing Group, Trusted Computing Group, available at
-
The Trusted Computing Group. Trusted Computing Platform Alliance. Main Specification Version 1.1b. Trusted Computing Group, 2003. available at https://www.trustedcomputinggroup.org/specs/TPM.
-
(2003)
Trusted Computing Platform Alliance. Main Specification Version 1.1b
-
-
-
16
-
-
62849119924
-
-
University of Bochum. TrustedGRUB. available at http://sourceforge.net/ projects/trustedgrub, last visited July 2007.
-
University of Bochum. TrustedGRUB. available at http://sourceforge.net/ projects/trustedgrub, last visited July 2007.
-
-
-
-
17
-
-
85073202707
-
Automated Recovery in a Secure Bootstrap Process
-
W. A. Arbaugh, A. D. Keromytis, D. J. Farber, and J. M. Smith. Automated Recovery in a Secure Bootstrap Process. Internet Society 1998 Symposium on Network and Distributed System Security, pages 155 - 167, 1998.
-
(1998)
Internet Society 1998 Symposium on Network and Distributed System Security
, pp. 155-167
-
-
Arbaugh, W.A.1
Keromytis, A.D.2
Farber, D.J.3
Smith, J.M.4
|