-
2
-
-
33749617824
-
User interfaces for privacy agents
-
L. Cranor, P. Guduru, and M. Arjula. User interfaces for privacy agents. ACM Transactions on Computer Human Interaction, 12(2):135-178, 2006.
-
(2006)
ACM Transactions on Computer Human Interaction
, vol.12
, Issue.2
, pp. 135-178
-
-
Cranor, L.1
Guduru, P.2
Arjula, M.3
-
5
-
-
34249856296
-
Decision strategies and susceptibility to phishing
-
New York, NY, USA, ACM
-
J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the second symposium on Usable privacy and security
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
7
-
-
65449133407
-
State of customer satisfaction with online banking, forsee results/forbes.com
-
April
-
L. Freed. State of customer satisfaction with online banking, forsee results/forbes.com, April 2007.
-
(2007)
-
-
Freed, L.1
-
8
-
-
85084161244
-
-
K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award).
-
K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award).
-
-
-
-
12
-
-
0038687701
-
Securing passwords against dictionary attacks
-
B. Pinkas and T. Sanders. Securing passwords against dictionary attacks. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Pinkas, B.1
Sanders, T.2
-
13
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In Proceedings of the USENIX Workshop on Hot topics in Understand Botnets (HotBots), 2007.
-
(2007)
Proceedings of the USENIX Workshop on Hot topics in Understand Botnets (HotBots)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
14
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In IEEE Symposium on Security and Privacy, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
15
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51-65, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
17
-
-
65449143107
-
-
WatchFire's AppScan Product.
-
WatchFire's AppScan Product.
-
-
-
-
19
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
20
-
-
84868926582
-
-
Why Use YURLs?, 2003. http://www.waterken.com/dev/YURL/Why/.
-
(2003)
Why Use YURLs
-
-
|