-
4
-
-
77950878621
-
-
personal communication.
-
Michael Barrett, PayPal CSO, personal communication.
-
PayPal CSO
-
-
Barrett, M.1
-
10
-
-
36949010773
-
Tamper-Evident Digital Signatures: Protecting Certi cation Authorities Against Malware
-
J.Y. Choi, P. Golle, and M. Jakobsson, "Tamper-Evident Digital Signatures: Protecting Certi cation Authorities Against Malware," DACS, 2006.
-
(2006)
DACS
-
-
Choi, J.Y.1
Golle, P.2
Jakobsson, M.3
-
11
-
-
77957695303
-
Organised crime groups in cyberspace: A typology
-
DOI 10.1007/s12117-008-9038-9
-
K.-K. R. Choo, "Organised crime groups in cyberspace: a typology," Trends in Organized Crime, DOI 10.1007/s12117-008-9038-9, 2008.
-
(2008)
Trends in Organized Crime
-
-
Choo, K.-K.R.1
-
12
-
-
84957086893
-
How to Forget a Secret
-
Springer-Verlag
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, "How To Forget a Secret," In STACS. LNCS 1563. Springer-Verlag, pp. 500-509, 1999.
-
(1999)
STACS. LNCS 1563
, pp. 500-509
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
14
-
-
84860582730
-
Mitigating Drive-by Download Attacks: Challenges and Open Problems
-
M. Egele, E. Kirda, and C. Kruegel. Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec, 2009.
-
(2009)
INetSec
-
-
Egele, M.1
Kirda, E.2
Kruegel, C.3
-
15
-
-
76549120876
-
-
October
-
Georgia Tech Information Security Center, "Emerging Cyber Threats Report for 2009," October, 2008. www.gtisc.gatech.edu/pdf/ CyberThreatsReport2009.pdf.
-
(2008)
Emerging Cyber Threats Report for 2009
-
-
-
16
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
A. J. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum and E. W. Felten, "Lest we remember: cold-boot attacks on encryption keys," Commun. ACM, pp. 91-98, 2009.
-
(2009)
Commun. ACM
, pp. 91-98
-
-
Halderman, A.J.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
17
-
-
77950904600
-
-
Abstract available at. Harris Interactive Public Relations Research, June
-
Harris Interactive Public Relations Research, "A Study about Mobile Device Users," June 2009. Abstract available at www.cloudmark.com/en/ company/mobile-survey.html, full version at www.cloudmark.com/releases/docs/ harris-poll- stats.pdf.
-
(2009)
A Study about Mobile Device Users
-
-
-
18
-
-
66249120727
-
Phone Infections
-
22 May
-
S. Havlin, "Phone Infections," Science, Vol.324. no.5930, pp. 1023-1024, 22 May 2009.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1023-1024
-
-
Havlin, S.1
-
21
-
-
77950899687
-
-
blogs.parc.com/ blog/2009/09/a-central-nervous-system-for-automatically- detecting-malware/, September 9
-
M. Jakobsson, "A Central Nervous System for Automatically Detecting Malware," blogs.parc.com/ blog/2009/09/a-central-nervous-system-for- automatically-detecting-malware/, September 9, 2009
-
(2009)
A Central Nervous System for Automatically Detecting Malware
-
-
Jakobsson, M.1
-
22
-
-
77950904599
-
-
blogs.parc.com/blog/2009/10/ will-mobile-payments-usher-in-a-new-era-of- crime/, October 13
-
M. Jakobsson, "Will mobile payments usher in a new era of crime?," blogs.parc.com/blog/2009/10/ will-mobile-payments-usher-in-a-new- era-of-crime/, October 13, 2009
-
(2009)
Will Mobile Payments Usher in a New Era of Crime?
-
-
Jakobsson, M.1
-
24
-
-
84925063335
-
-
Javelin Strategy and Research, February
-
Javelin Strategy and Research, "2008 Identity Fraud Survey Report", February 2008. www.javelinstrategy.com/products/F59339/97/ delivery.pdf.
-
(2008)
2008 Identity Fraud Survey Report
-
-
-
25
-
-
67249151917
-
PhishGuru: Lessons from a Real World Evaluation of Anti-Phishing Training
-
October 15-16
-
P. Kumaraguru, S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong, "PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training," e-Crime Researchers Summit, Anti-Phishing Working Group, October 15-16, 2008.
-
(2008)
e-Crime Researchers Summit, Anti-Phishing Working Group
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.I.5
-
26
-
-
77950874095
-
Towards better software tamper resistance
-
H. Jin, G. Myles and J. Lotspiech, "Towards better software tamper resistance," Information Security Conference, Springer, 2005.
-
Information Security Conference, Springer, 2005
-
-
Jin, H.1
Myles, G.2
Lotspiech, J.3
-
27
-
-
84876345999
-
Key evolution-based tamper resistance: A subgroup extension
-
H. Jin, G. Myles and J. Lotspiech, "Key evolution-based tamper resistance: A subgroup extension," Association for Computing Machinery (ACM) Symposium on Information, Computer and Communications Security (ASIACCS), 2007.
-
Association for Computing Machinery (ACM) Symposium on Information, Computer and Communications Security (ASIACCS), 2007
-
-
Jin, H.1
Myles, G.2
Lotspiech, J.3
-
31
-
-
85021950441
-
Cryptographic support for secure logs on untrusted machines
-
B. Schneier and J. Kelsey, "Cryptographic support for secure logs on untrusted machines," ACM TISSEC, 2(2):159Ñ176, 1999.
-
(1999)
ACM TISSEC
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
32
-
-
41949111662
-
Using Cartoons to Teach Internet Security
-
S. Srikwan and M. Jakobsson, "Using Cartoons to Teach Internet Security," Cryptologia, vol.32, no.2, 2008.
-
(2008)
Cryptologia
, vol.32
, Issue.2
-
-
Srikwan, S.1
Jakobsson, M.2
-
33
-
-
68149130387
-
-
Published November eval.symantec.com/mktginfo/enterprise/white- papers/b-whitepaper-underground-economy- report-11-2008-14525717.en-us.pdf
-
Symantec Report on the Underground Economy, Published November 2008, eval.symantec.com/mktginfo/enterprise/white- papers/b-whitepaper-underground- economy- report-11-2008-14525717.en-us.pdf.
-
(2008)
Symantec Report on the Underground Economy
-
-
-
34
-
-
54749125032
-
-
Trusted Computing Group. Version 1.2, Revision 103, July
-
Trusted Computing Group. Trusted platform module main specication. Version 1.2, Revision 103, July 2007.
-
(2007)
Trusted Platform Module Main Specication
-
-
-
35
-
-
66349131932
-
Understanding the Spreading Patterns of Mobile Phone Viruses
-
2 April
-
P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, 2 April 2009.
-
(2009)
Science
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
|