-
1
-
-
77953898573
-
-
http://www.rsasecurity.com.
-
-
-
-
2
-
-
77953898928
-
-
http://www.scamblocker.com.
-
-
-
-
3
-
-
77953895514
-
-
http://www.spoofstick.com.
-
-
-
-
4
-
-
77953882114
-
-
http://www.passmarksecurity.com.
-
-
-
-
6
-
-
85044841595
-
Client-side defense against web-based identity theft
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell. Client-side defense against web-based identity theft. Proc. NDSS, 2004.
-
Proc. NDSS, 2004
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
9
-
-
4444355305
-
-
Federal Trade Commission. Identity Theft Survey Report. 2003. http://www.ftc.gov/os/2003/09/synovatereport.pdf.
-
(2003)
Identity Theft Survey Report
-
-
-
11
-
-
34548172244
-
Stopping a Phishing Attack, even when the Victims Ignore Warnings
-
D. Florêncio and C. Herley. Stopping a Phishing Attack, Even when the Victims Ignore Warnings. MSR Tech. Report TR-2005-142, 2005.
-
(2005)
MSR Tech. Report TR-2005-142
-
-
Florêncio, D.1
Herley, C.2
-
12
-
-
77953888802
-
Analysis and Improvement of Anti-Phishing Schemes
-
D. Florêncio and C. Herley. Analysis and Improvement of Anti-Phishing Schemes. SEC, 2006.
-
(2006)
SEC
-
-
Florêncio, D.1
Herley, C.2
-
15
-
-
0012228530
-
-
Statistics Research Reports from AT&T Laboratories 94.5, AT&T Bell Laboratories
-
W. Gale. Good-Turing Smoothing Without Tears. Statistics Research Reports from AT&T Laboratories 94.5, AT&T Bell Laboratories, 1994.
-
(1994)
Good-Turing Smoothing Without Tears
-
-
Gale, W.1
-
20
-
-
84947906944
-
Secure applications of low-entropy keys
-
J. Kelsey, B. Schneier, C. Hall, and D. Wagner. Secure applications of low-entropy keys. Lecture Notes in Computer Science, 1396:121-134, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1396
, pp. 121-134
-
-
Kelsey, J.1
Schneier, B.2
Hall, C.3
Wagner, D.4
-
21
-
-
39049083922
-
Countering identity theft through digital uniqueness, location cross-checking, and funneling
-
P. Oorschot and S. Stubblebine. Countering identity theft through digital uniqueness, location cross-checking, and funneling. Financial Cryptography, 2005.
-
(2005)
Financial Cryptography
-
-
Oorschot, P.1
Stubblebine, S.2
-
22
-
-
77953890602
-
-
Anti-Phishing Working Group. http://www.antiphishing.org.
-
-
-
-
23
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. Proceedings of the 14th Usenix Security Symposium, 2005.
-
Proceedings of the 14th Usenix Security Symposium, 2005
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
25
-
-
34548786769
-
The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. Schechter, R. Dhamija, A. Ozment, I. Fischer. The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. IEEE Security & Privacy, 2007.
-
(2007)
IEEE Security & Privacy
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
28
-
-
33745867321
-
Do Security Toolbars Actually Prevent Phishing Attacks
-
M. Wu, R. Miller, and S. L. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks. CHI, 2006.
-
(2006)
CHI
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.L.3
-
29
-
-
34548170018
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
M. Wu, R. Miller, and G. Little. Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. SOUPS, 2006.
-
(2006)
SOUPS
-
-
Wu, M.1
Miller, R.2
Little, G.3
-
30
-
-
34547204254
-
Passpet: Convenient Password Management and Phishing Protection
-
K. Yee and K. Sitaker. Passpet: Convenient Password Management and Phishing Protection. SOUPS, 2006.
-
(2006)
SOUPS
-
-
Yee, K.1
Sitaker, K.2
|