-
5
-
-
74049127030
-
Does Anyone Fall for Phishing Scams Anymore?
-
P. Hallam-Baker. Does Anyone Fall for Phishing Scams Anymore? IT Security Journal.com, (2008). http://www.itsecurityjournal.com/index.php/ Latest/ Does-Anyone-Fall-for-Phishing-Scams-Anymore.html
-
(2008)
IT Security Journal.com
-
-
Hallam-Baker, P.1
-
7
-
-
35348906237
-
Protecting People From Phishing: The Design and Evaluation of an Embedded Training Email System
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L.F. Cranor, J. Hong, and E. Nunge. Protecting People From Phishing: The Design and Evaluation of an Embedded Training Email System. In CHI Conf. on Human Factors in Computing Systems, (2007).
-
(2007)
CHI Conf. on Human Factors in Computing Systems
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
9
-
-
84950656359
-
Variations of box plots
-
Feb
-
R. McGill, R.W. Tukey, and W.A. Larsen. Variations of box plots. The American Statistician, 32(1):12-16, Feb. (1978).
-
(1978)
The American Statistician
, vol.32
, Issue.1
, pp. 12-16
-
-
McGill, R.1
Tukey, R.W.2
Larsen, W.A.3
-
10
-
-
74049088402
-
-
Microsoft Security Bulletin MS01-017 (Mar.22 2001; updated Mar.28 2001). Erroneous VeriSign-Issued Digital Certificates Pose Spoo ng Hazard, http://www.microsoft.com/technet/security/bulletin/ ms01-017.mspx
-
Microsoft Security Bulletin MS01-017 (Mar.22 2001; updated Mar.28 2001). Erroneous VeriSign-Issued Digital Certificates Pose Spoo ng Hazard, http://www.microsoft.com/technet/security/bulletin/ ms01-017.mspx
-
-
-
-
11
-
-
74049097314
-
MD5 Considered Harmful Today: Creating a Rogue CA Certificate
-
Berlin, Germany, December 30
-
D. Molnar, M. Stevens, A. Lenstra, B. de Weger, A. Sotirov, J. Appelbaum, and D.A. Osvik. MD5 Considered Harmful Today: Creating a Rogue CA Certificate. 25th Chaos Communication Congress, Berlin, Germany, December 30 (2008).
-
(2008)
25th Chaos Communication Congress
-
-
Molnar, D.1
Stevens, M.2
Lenstra, A.3
de Weger, B.4
Sotirov, A.5
Appelbaum, J.6
Osvik, D.A.7
-
12
-
-
74049153106
-
-
Net Applications. Global Market Share Statistics, March 2009, http://marketshare.hitslink.com/browser-market-share.aspx?qprid=2 (retrieved April 11, 2009)
-
Net Applications. Global Market Share Statistics, March 2009, http://marketshare.hitslink.com/browser-market-share.aspx?qprid=2 (retrieved April 11, 2009)
-
-
-
-
13
-
-
74049094941
-
-
Personal blog, December 23
-
E. Nigg. Untrusted Certificates. Personal blog, December 23, 2008, https://blog.startcom.org/?p=145
-
(2008)
Untrusted Certificates
-
-
Nigg, E.1
-
16
-
-
3042740017
-
Humans in the Loop: Human-Computer Interaction and Security
-
May/June
-
S.W. Smith. Humans in the Loop: Human-Computer Interaction and Security. IEEE Security and Privacy, 1(3):75-79, May/June (2003).
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 75-79
-
-
Smith, S.W.1
-
18
-
-
74049157923
-
Browser Interfaces and EV-SSL Certificates: Confusion, Inconsistencies and HCI Challenges
-
Technical Report TR-09-02 January 15, School of Computer Science, Carleton University, Canada
-
J. Sobey, P.C. van Oorschot, A.S. Patrick. Browser Interfaces and EV-SSL Certificates: Confusion, Inconsistencies and HCI Challenges. Technical Report TR-09-02 (January 15, 2009), School of Computer Science, Carleton University, Canada.
-
(2009)
-
-
Sobey, J.1
van Oorschot, P.C.2
Patrick, A.S.3
-
19
-
-
74049136688
-
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study. Carleton University, School of Computer Science
-
Technical Report TR-09-06 July
-
J. Sobey, T. Whalen,, R. Biddle, P.C. van Oorschot, and A.S. Patrick. Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study. Carleton University, School of Computer Science, Technical Report TR-09-06 (July 2009).
-
(2009)
-
-
Sobey, J.1
Whalen, T.2
Biddle, R.3
van Oorschot, P.C.4
Patrick, A.S.5
-
20
-
-
84926351578
-
Crying Wolf: An Empirical Study of SSL Warning Effectiveness
-
August
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L.F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proc. of the 18th Usenix Security Symposium, August (2009).
-
(2009)
Proc. of the 18th Usenix Security Symposium
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
21
-
-
32244434492
-
Gathering Evidence: Use of Visual Security Cues in Web Browsing
-
May
-
T. Whalen and K. Inkpen. Gathering Evidence: Use of Visual Security Cues in Web Browsing. In Proc. of Graphics Interface 2005, pp. 137-145, May (2005).
-
(2005)
Proc. of Graphics Interface 2005
, pp. 137-145
-
-
Whalen, T.1
Inkpen, K.2
-
24
-
-
74049133040
-
Sub-Prime PKI: Attacking Extended Validation SSL
-
Las Vegas, USA, July
-
M. Zusman and A. Sotirov. Sub-Prime PKI: Attacking Extended Validation SSL. Black Hat Security Briefings, Las Vegas, USA, July (2009).
-
(2009)
Black Hat Security Briefings
-
-
Zusman, M.1
Sotirov, A.2
|