메뉴 건너뛰기




Volumn 269, Issue , 2007, Pages 26-36

Evaluating a trial deployment of password re-use for phishing prevention

Author keywords

access control; authentication; passwords; phishing

Indexed keywords

FALSE POSITIVE; LOW LATENCY; PASSWORDS; PHISHERS; PHISHING; PREVENT INFORMATION LEAKAGE;

EID: 67249093944     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1299015.1299018     Document Type: Conference Paper
Times cited : (12)

References (30)
  • 1
    • 77953898573 scopus 로고    scopus 로고
    • http://www.rsasecurity.com.
  • 2
    • 77953898928 scopus 로고    scopus 로고
    • http://www.scamblocker.com.
  • 3
    • 77953895514 scopus 로고    scopus 로고
    • http://www.spoofstick.com.
  • 4
    • 77953882114 scopus 로고    scopus 로고
    • http://www.passmarksecurity.com.
  • 9
    • 4444355305 scopus 로고    scopus 로고
    • Federal Trade Commission. Identity Theft Survey Report. 2003. http://www.ftc.gov/os/2003/09/synovatereport.pdf.
    • (2003) Identity Theft Survey Report
  • 11
    • 34548172244 scopus 로고    scopus 로고
    • Stopping a Phishing Attack, even when the Victims Ignore Warnings
    • D. Florêncio and C. Herley. Stopping a Phishing Attack, Even when the Victims Ignore Warnings. MSR Tech. Report TR-2005-142, 2005.
    • (2005) MSR Tech. Report TR-2005-142
    • Florêncio, D.1    Herley, C.2
  • 12
    • 77953888802 scopus 로고    scopus 로고
    • Analysis and Improvement of Anti-Phishing Schemes
    • D. Florêncio and C. Herley. Analysis and Improvement of Anti-Phishing Schemes. SEC, 2006.
    • (2006) SEC
    • Florêncio, D.1    Herley, C.2
  • 15
    • 0012228530 scopus 로고
    • Statistics Research Reports from AT&T Laboratories 94.5, AT&T Bell Laboratories
    • W. Gale. Good-Turing Smoothing Without Tears. Statistics Research Reports from AT&T Laboratories 94.5, AT&T Bell Laboratories, 1994.
    • (1994) Good-Turing Smoothing Without Tears
    • Gale, W.1
  • 21
    • 39049083922 scopus 로고    scopus 로고
    • Countering identity theft through digital uniqueness, location cross-checking, and funneling
    • P. Oorschot and S. Stubblebine. Countering identity theft through digital uniqueness, location cross-checking, and funneling. Financial Cryptography, 2005.
    • (2005) Financial Cryptography
    • Oorschot, P.1    Stubblebine, S.2
  • 22
    • 77953890602 scopus 로고    scopus 로고
    • Anti-Phishing Working Group. http://www.antiphishing.org.
  • 25
    • 34548786769 scopus 로고    scopus 로고
    • The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. Schechter, R. Dhamija, A. Ozment, I. Fischer. The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. IEEE Security & Privacy, 2007.
    • (2007) IEEE Security & Privacy
    • Schechter, S.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 28
    • 33745867321 scopus 로고    scopus 로고
    • Do Security Toolbars Actually Prevent Phishing Attacks
    • M. Wu, R. Miller, and S. L. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks. CHI, 2006.
    • (2006) CHI
    • Wu, M.1    Miller, R.2    Garfinkel, S.L.3
  • 29
    • 34548170018 scopus 로고    scopus 로고
    • Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
    • M. Wu, R. Miller, and G. Little. Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. SOUPS, 2006.
    • (2006) SOUPS
    • Wu, M.1    Miller, R.2    Little, G.3
  • 30
    • 34547204254 scopus 로고    scopus 로고
    • Passpet: Convenient Password Management and Phishing Protection
    • K. Yee and K. Sitaker. Passpet: Convenient Password Management and Phishing Protection. SOUPS, 2006.
    • (2006) SOUPS
    • Yee, K.1    Sitaker, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.