-
1
-
-
70350385490
-
-
Nanda, A.: A technical reference for the information card profile v1.0 (2006)
-
Nanda, A.: A technical reference for the information card profile v1.0 (2006)
-
-
-
-
2
-
-
70350419807
-
-
Liberty Alliance Project:, final specifications
-
Liberty Alliance Project: Liberty Phase 2 final specifications (2003)
-
(2003)
Liberty Phase
, vol.2
-
-
-
3
-
-
70350353498
-
-
Kaler, C, ed, A.N, Web Services Federation Language (WS-Federation, Version 1.0, BEA and IBM and Microsoft and RSA Security and VeriSign 2003
-
Kaler, C. (ed.): A.N.: Web Services Federation Language (WS-Federation), Version 1.0, BEA and IBM and Microsoft and RSA Security and VeriSign (2003)
-
-
-
-
6
-
-
70350372183
-
-
Microsoft Corporation: .NET Passport documentation, in particular Technical Overview, and SDK 2.1 Documentation (started 1999) (2001)
-
Microsoft Corporation: .NET Passport documentation, in particular Technical Overview, and SDK 2.1 Documentation (started 1999) (2001)
-
-
-
-
7
-
-
0033719386
-
Risks of the passport single signon protocol
-
Kormann, D., Rubin, A.: Risks of the passport single signon protocol. Computer Networks 33(1-6), 51-58 (2000)
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 51-58
-
-
Kormann, D.1
Rubin, A.2
-
8
-
-
84944734046
-
Security analysis of the SAML single sign-on browser/artifact profile
-
IEEE Computer Society, Los Alamitos
-
Groß, T.: Security analysis of the SAML single sign-on browser/artifact profile. In: ACSAC 2003. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
ACSAC
-
-
Groß, T.1
-
9
-
-
74049120319
-
SAML artifact information flow revisited
-
IEEE Computer Society, Los Alamitos
-
Groß, T., Pfitzmann, B.: SAML artifact information flow revisited. In: Workshop on Web Services Security. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Workshop on Web Services Security
-
-
Groß, T.1
Pfitzmann, B.2
-
10
-
-
1142301938
-
Analysis of liberty single-sign-on with enabled clients
-
Pfitzmann, B., Waidner, M.: Analysis of liberty single-sign-on with enabled clients. IEEE Internet Computing 7(6), 38-44 (2003)
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 38-44
-
-
Pfitzmann, B.1
Waidner, M.2
-
12
-
-
70350372184
-
-
Personal communication with participants of dagstuhl seminar 09141 on web application security March 2009
-
Personal communication with participants of dagstuhl seminar 09141 on web application security (March 2009)
-
-
-
-
15
-
-
50049083384
-
Preventing cross site request forgery attacks
-
Jovanovic, N., Kirda, E., Kruegel, C.: Preventing cross site request forgery attacks. In: Securecomm and Workshops, pp. 1-10 (2006)
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Jovanovic, N.1
Kirda, E.2
Kruegel, C.3
-
16
-
-
33751032654
-
-
ACM, New York
-
Kirda, E., Krügel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks, pp. 330-337. ACM, New York (2006)
-
(2006)
Noxes: A client-side solution for mitigating cross-site scripting attacks
, pp. 330-337
-
-
Kirda, E.1
Krügel, C.2
Vigna, G.3
Jovanovic, N.4
-
17
-
-
38149086751
-
-
Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-by pharming. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, 4861, pp. 495-506. Springer, Heidelberg (2007)
-
Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-by pharming. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 495-506. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
48349084659
-
-
Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from dns rebinding attacks. In: CCS 2007, pp. 421-431. ACM, New York (2007)
-
Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from dns rebinding attacks. In: CCS 2007, pp. 421-431. ACM, New York (2007)
-
-
-
-
19
-
-
77952370957
-
-
Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
-
Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
-
-
-
-
20
-
-
70350355379
-
-
Akritidis, P., Chin, W.Y., Lam, V.T., Sidiroglou, S., Anagnostakis, K.G.: Proximity breeds danger: emerging threats in metro-area wireless networks. In: SS 2007, pp. 1-16. USENIX Association (2007)
-
Akritidis, P., Chin, W.Y., Lam, V.T., Sidiroglou, S., Anagnostakis, K.G.: Proximity breeds danger: emerging threats in metro-area wireless networks. In: SS 2007, pp. 1-16. USENIX Association (2007)
-
-
-
-
21
-
-
57049104588
-
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.R., Schwenk, J.: Universally composable security analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, 5324, pp. 313-327. Springer, Heidelberg (2008)
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.R., Schwenk, J.: Universally composable security analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 313-327. Springer, Heidelberg (2008)
-
-
-
-
22
-
-
70350346082
-
-
Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for md5 and the creation of a rogue ca certificate. In: Crypto 2009. Springer, Heidelberg (to appear, 2009)
-
Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for md5 and the creation of a rogue ca certificate. In: Crypto 2009. Springer, Heidelberg (to appear, 2009)
-
-
-
-
23
-
-
33745816410
-
-
Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHI, pp. 581-590. ACM, New York (2006)
-
Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHI, pp. 581-590. ACM, New York (2006)
-
-
-
-
24
-
-
34548786769
-
The emperor's new security indicators
-
IEEE Computer Society, Los Alamitos
-
Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: The emperor's new security indicators. In: Symposium on Security and Privacy, pp. 51-65. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
25
-
-
57849132173
-
Why Johnny can't surf (safely)? attacks and defenses for web users
-
Herzberg, A.: Why Johnny can't surf (safely)? attacks and defenses for web users. Elsevier Computers & Security 28(1-2), 63-71 (2009)
-
(2009)
Elsevier Computers & Security
, vol.28
, Issue.1-2
, pp. 63-71
-
-
Herzberg, A.1
-
26
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
-
Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An evaluation of extended validation and picture-in-picture phishing attacks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 281-293. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 281-293
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
27
-
-
70350403500
-
-
Jackson, C., Barth, A.: Beware of finer-grained origins. In: W2SP 2008 (2008)
-
Jackson, C., Barth, A.: Beware of finer-grained origins. In: W2SP 2008 (2008)
-
-
-
-
28
-
-
49849102924
-
Ssl/tls session-aware user authentication
-
Oppliger, R., Hauser, R., Basin, D.: Ssl/tls session-aware user authentication. Computer 41(3), 59-65 (2008)
-
(2008)
Computer
, vol.41
, Issue.3
, pp. 59-65
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
30
-
-
70350372179
-
-
Dierks, T, Allen, C, RFC2246, The tls protocol version 1.0 1999
-
Dierks, T., Allen, C.: RFC2246, The tls protocol version 1.0 (1999)
-
-
-
|