-
1
-
-
0027678308
-
Authentication and delegation with smartcards
-
M. Abadi, M. Burrows, C. Kaufman and B. Lampson, Authentication and delegation with smartcards, Science of Computer Programming 21(2) (1993), 91-113.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 91-113
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
2
-
-
84871201016
-
An experimental investigation of the usability of transaction authorization in online bank security systems
-
Wollongong, Australia, January
-
M. AlZomai, B. AlFayyadh, A. Jøsang and A. McCullag, An experimental investigation of the usability of transaction authorization in online bank security systems, in: Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008, pp. 65-73.
-
(2008)
Australasian Information Security Conference (AISC'08)
, pp. 65-73
-
-
AlZomai, M.1
AlFayyadh, B.2
Jøsang, A.3
McCullag, A.4
-
3
-
-
34548344520
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group, Phishing Activity Trends Report Q4/2009, available at: http://www. antiphishing.org/reports/apwg-report-Q4-2009.pdf.
-
(2009)
Phishing Activity Trends Report
-
-
-
4
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P.H. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò and L. Vigneron, The AVISPA tool for the automated validation of Internet security protocols and applications, in: Computer Aided Verification (CAV), Edinburgh, Scotland, UK, July 2005, LNCS, Vol. 3576, Springer-Verlag, 2005, pp. 281-285, available at: http://www.avispa-project.org. (Pubitemid 41431740)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
5
-
-
70349257241
-
TwoKind authentication: Protecting private information in untrustworthy environments
-
Alexandria, VA, USA, October
-
K. Bailey, A. Kapadia, L. Vongsathorn and S.W. Smith, TwoKind authentication: Protecting private information in untrustworthy environments, in: ACM Workshop on Privacy in the Electronic Society (WPES'08), Alexandria, VA, USA, October 2008, pp. 39-44.
-
(2008)
ACM Workshop on Privacy in the Electronic Society (WPES'08)
, pp. 39-44
-
-
Bailey, K.1
Kapadia, A.2
Vongsathorn, L.3
Smith, S.W.4
-
6
-
-
85084162119
-
Hand-held computers can be better smart cards
-
Washington, DC, USA, August
-
D. Balfanz and E. Felten, Hand-held computers can be better smart cards, in: USENIX Security Symposium, Washington, DC, USA, August 1999, pp. 15-24.
-
(1999)
USENIX Security Symposium
, pp. 15-24
-
-
Balfanz, D.1
Felten, E.2
-
7
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Journal of Cryptology 21(4) (2008), 469-491.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
84945119254
-
Entity authentication and key distribution
-
Santa Barbara, CA, USA, August, LNCS, Springer-Verlag
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO'93, Santa Barbara, CA, USA, August 1993, LNCS, Vol. 773, Springer-Verlag, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology - CRYPTO'93
, vol.773
, Issue.1993
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
35048898743
-
Cryptanalysis of the alleged SecurID hash function
-
Ottawa, Canada, August, LNCS, Springer-Verlag, 2003
-
A. Biryukov, J. Lano and B. Preneel, Cryptanalysis of the alleged SecurID hash function, in: Selected Areas in Cryptography (SAC), Ottawa, Canada, August 2003, LNCS, Vol. 3006, Springer-Verlag, 2003, pp. 130-144.
-
(2003)
Selected Areas in Cryptography (SAC)
, vol.3006
, pp. 130-144
-
-
Biryukov, A.1
Lano, J.2
Preneel, B.3
-
10
-
-
79960821157
-
-
CA Virus Information Center February
-
CA Virus Information Center, Win32.Grams.I, February 2005.
-
(2005)
Win32.Grams.I
-
-
-
11
-
-
80052801173
-
A usability study and critique of two password managers
-
Vancouver, Canada, August
-
S. Chiasson, P. van Oorschot and R. Biddle, A usability study and critique of two password managers, in: USENIX Security Symposium, Vancouver, Canada, August 2006, pp. 1-16.
-
(2006)
USENIX Security Symposium
, pp. 1-16
-
-
Chiasson, S.1
Van Oorschot, P.2
Biddle, R.3
-
12
-
-
84958955276
-
The untrusted computer problem and camera-based authentication
-
Zurich, Switzerland, August, LNCS, Springer-Verlag, 2002
-
D.E. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas and R.L. Rivest, The untrusted computer problem and camera-based authentication, in: Pervasive Computing, Zurich, Switzerland, August 2002, LNCS, Vol. 2414, Springer-Verlag, 2002, pp. 114-124.
-
(2002)
Pervasive Computing
, vol.2414
, pp. 114-124
-
-
Clarke, D.E.1
Gassend, B.2
Kotwal, T.3
Burnside, M.4
Van Dijk, M.5
Devadas, S.6
Rivest, R.L.7
-
13
-
-
79960804783
-
-
Computerworld.com, News article, April 8
-
Computerworld.com, Malware count blows past 1M mark, News article, April 8, 2008.
-
(2008)
Malware count blows past 1M mark
-
-
-
14
-
-
84865581888
-
Recursive dns architectures and vulnerability implications
-
San Diego, CA, USA, February
-
D. Dagon, M. Antonakakis, X. Luo, C.P. Lee, W. Lee and K. Day, Recursive dns architectures and vulnerability implications, in: Network and Distributed System Security Symposium (NDSS'09), San Diego, CA, USA, February 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS'09)
-
-
Dagon, D.1
Antonakakis, M.2
Luo, X.3
Lee, C.P.4
Lee, W.5
Day, K.6
-
15
-
-
33847655213
-
Protocol composition logic (PCL
-
A. Datta, A. Derek, J.C. Mitchell and A. Roy, Protocol composition logic (PCL), Electronic Notes in Theoretical Computer Science (ENTCS) 172 (2007), 311-358.
-
(2007)
Electronic Notes in Theoretical Computer Science (ENTCS)
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
16
-
-
33745816410
-
Why phishing works
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
R. Dhamija, J. Tygar and M. Hearst, Why phishing works, in: CHI, Montreal, Canada, April 2006, pp. 581-590. (Pubitemid 44032146)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
17
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. van Oorschot and M.J. Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography 2(2) (1992), 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
18
-
-
60049085302
-
Understanding Android security
-
W. Enck,M. Ongtang and P. McDaniel, Understanding Android security, IEEE Security and Privacy Magazine 7(1) (2009), 50-57.
-
(2009)
IEEE Security and Privacy Magazine
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
19
-
-
79960763088
-
-
Eweek.com, Tax scam preys on refund-hungry public with real gov site, News article, November 30, available at:
-
Eweek.com, Tax scam preys on refund-hungry public with real gov site, News article, November 30, 2005, available at: http://www.eweek.com/article2/0, 1895,1894746,00.asp.
-
(2005)
-
-
-
21
-
-
79960772378
-
-
F-Secure, F-Secure trojan information pages: Redbrowser.A, March 2006
-
F-Secure, F-Secure trojan information pages: Redbrowser.A, March 2006.
-
-
-
-
22
-
-
70449332446
-
-
Federal Financial Institutions Examination Council (FFIEC October, available at:
-
Federal Financial Institutions Examination Council (FFIEC), FFIEC guidance: Authentication in an Internet banking environment, October 2005, available at: http://www.fdic.gov/news/news/ financial/2005/fil10305.html.
-
(2005)
FFIEC Guidance: Authentication in an Internet Banking Environment
-
-
-
23
-
-
0005785915
-
Web spoofing: An Internet con game
-
Baltimore, MD, USA, October
-
E.W. Felten, D. Balfanz, D. Dean and D.S. Wallach, Web spoofing: An Internet con game, in: National Information Systems Security Conference, Baltimore, MD, USA, October 1997.
-
(1997)
National Information Systems Security Conference
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
24
-
-
79960780767
-
-
Finjan Malicious Code Research Center, Cybercrime intelligence report: Cybercriminals use Trojans & money mules to rob online banking accounts. Online article (issue no. 3, available at:
-
Finjan Malicious Code Research Center, Cybercrime intelligence report: Cybercriminals use Trojans & money mules to rob online banking accounts. Online article (issue no. 3, 2009), available at: http://www.finjan.com/ GetObject.aspx?ObjId=679.
-
(2009)
-
-
-
25
-
-
79960808450
-
-
Finjan Malicious Code Research Center, available at:
-
Finjan Malicious Code Research Center, Web security trends Report Q3/2007, available at: http://www.finjan.com/GetObject.aspx?ObjId=506.
-
(2007)
Web Security Trends Report Q3
-
-
-
26
-
-
0010227321
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
Yokohama, Japan, April, LNCS, Springer-Verlag, 2001
-
V.D. Gligor and P. Donescu, Fast encryption and authentication: XCBC encryption and XECB authentication modes, in: Workshop on Fast Software Encryption (FSE'01), Yokohama, Japan, April 2001, LNCS, Vol. 2355, Springer-Verlag, 2001, pp. 1-20.
-
(2001)
Workshop on Fast Software Encryption (FSE'01)
, vol.2355
, pp. 1-20
-
-
Gligor, V.D.1
Donescu, P.2
-
27
-
-
79960803091
-
-
January-June, Malicious programs for mobile devices, September 2006, available at:
-
A. Gostev and A. Shevchenko, Kaspersky security bulletin, January-June 2006: Malicious programs for mobile devices, September 2006, available at: http://www.viruslist.com.
-
(2006)
Kaspersky Security Bulletin
-
-
Gostev, A.1
Shevchenko, A.2
-
29
-
-
33745770376
-
A modular correctness proof of
-
Alexandria, VA, USA, November
-
C. He,M. Sundararajan, A. Datta, A. Derek and J.C.Mitchell, A modular correctness proof of IEEE 802.11i and TLS, in: ACM Computer and Communications Security (CCS'05), Alexandria, VA, USA, November 2005, pp. 2-15.
-
(2005)
IEEE 802.11i and TLS ACM Computer and Communications Security (CCS'05)
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
30
-
-
79960759551
-
-
ICANN Security Stability Advisory Committee, July, available at:
-
ICANN Security and Stability Advisory Committee, Domain name hijacking: Incidents, threats, risks, and remedial actions, July 2005, available at: http://www.icann.org.
-
(2005)
Domain Name Hijacking: Incidents, Threats, Risks, and Remedial Actions
-
-
-
31
-
-
79960824293
-
-
IDG News Service, News article, May 21, available at:
-
IDG News Service, Investigators replicate Nokia 1100 online banking hack, News article, May 21, 2009, available at: http://www.thestandard.com/news/2009/ 05/21/investigators-replicate-nokia- 1100-online-banking-hack.
-
(2009)
Investigators Replicate Nokia 1100 Online Banking Hack
-
-
-
33
-
-
84891128357
-
Transaction generators: Root kits for web
-
Boston, MA, USA, August
-
C. Jackson, D. Boneh and J. Mitchell, Transaction generators: Root kits for web, in: USENIX Workshop on Hot Topics in Security (HotSec'07), Boston, MA, USA, August 2007.
-
(2007)
USENIX Workshop on Hot Topics in Security (HotSec'07)
-
-
Jackson, C.1
Boneh, D.2
Mitchell, J.3
-
34
-
-
39049092821
-
Delegate: A proxy based architecture for secure website access from an untrusted machine
-
DOI 10.1109/ACSAC.2006.23, 4041154, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
R.C. Jammalamadaka, T. van der Horst, S. Mehrotra, K. Seamons and N. Venkatasuramanian, Delegate: A proxy based architecture for secure website access from an untrusted machine, in: Annual Computer Security Applications Conference (ACSAC'06),Miami Beach, FL, USA, December 2006, pp. 57-66. (Pubitemid 351232902)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 57-66
-
-
Jammalamadaka, R.C.1
Van Der Horst, T.W.2
Mehrotra, S.3
Seamons, K.E.4
Venkasubramanian, N.5
-
35
-
-
79960801358
-
Black ops
-
Black Hat USA, Las Vegas, NV, USA, August 2008
-
D. Kaminsky, Black Ops 2008 - It's the end of the cache as we know it, in: Black Hat USA, Las Vegas, NV, USA, August 2008.
-
(2008)
It's the End of the Cache as we Know it
-
-
Kaminsky, D.1
-
36
-
-
51749117408
-
A correctness proof of a mesh security architecture
-
Pittsburgh, PA, USA, June
-
D. Kuhlman, R. Moriarty, T. Braskich, S. Emeott and M. Tripunitara, A correctness proof of a mesh security architecture, in: IEEE Computer Security Foundations Symposium (CSF), Pittsburgh, PA, USA, June 2008, pp. 315-330.
-
(2008)
IEEE Computer Security Foundations Symposium (CSF)
, pp. 315-330
-
-
Kuhlman, D.1
Moriarty, R.2
Braskich, T.3
Emeott, S.4
Tripunitara, M.5
-
37
-
-
70450260549
-
Computing under occupation
-
New Hampshire, USA, September
-
K. Kursawe and S. Katzenbeisser, Computing under occupation, in: New Security Paradigms Workshop (NSPW'07), New Hampshire, USA, September 2007, pp. 81-88.
-
(2007)
New Security Paradigms Workshop (NSPW'07)
, pp. 81-88
-
-
Kursawe, K.1
Katzenbeisser, S.2
-
38
-
-
77950587694
-
Choose the red pill and the blue pill
-
Lake Tahoe, CA, USA, September
-
B. Laurie and A. Singer, Choose the red pill and the blue pill, in: New Security Paradigms Workshop (NSPW'08), Lake Tahoe, CA, USA, September 2008, pp. 127-133.
-
(2008)
New Security Paradigms Workshop (NSPW'08)
, pp. 127-133
-
-
Laurie, B.1
Singer, A.2
-
40
-
-
38549118817
-
Using a personal device to strengthen password authentication from an untrusted computer
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
M. Mannan and P. van Oorschot, Using a personal device to strengthen password authentication from an untrusted computer, in: Financial Cryptography and Data Security (FC'07), Lowlands, Scarborough, Trinidad and Tobago, February 2007, LNCS, Vol. 4886, Springer-Verlag, 2007, pp. 88-103. (Pubitemid 351153046)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 88-103
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
41
-
-
84865024945
-
Digital objects as passwords
-
San Jose, CA, USA, July
-
M. Mannan and P. van Oorschot, Digital objects as passwords, in: USENIX Workshop on Hot Topics in Security (HotSec'08), San Jose, CA, USA, July 2008.
-
(2008)
USENIX Workshop on Hot Topics in Security (HotSec'08)
-
-
Mannan, M.1
Van Oorschot, P.2
-
42
-
-
38549114809
-
-
Technical Report 04-37, University of Massachusetts, Amherst, June
-
N.B. Margolin, M.K. Wright and B.N. Levine, Guardian: A framework for privacy control in untrusted environments, Technical Report 04-37, University of Massachusetts, Amherst, June 2004.
-
(2004)
Guardian: A Framework for Privacy Control in Untrusted Environments
-
-
Margolin, N.B.1
Wright, M.K.2
Levine, B.N.3
-
43
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
Glasgow, Scotland, UK, April
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter and H. Isozaki, Flicker: An execution infrastructure for TCB minimization, in: The European Conference on Computer Systems (EuroSys'08), Glasgow, Scotland, UK, April 2008, pp. 315-328.
-
(2008)
The European Conference on Computer Systems (EuroSys'08)
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
44
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
J.M. McCune, A. Perrig and M.K. Reiter, Seeing-is-believing: Using camera phones for humanverifiable authentication, in: IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005, pp. 110-124. (Pubitemid 41543650)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
45
-
-
85077302433
-
Bump in the Ether: A framework for securing sensitive user input
-
Boston, MA, USA
-
J.M. McCune, A. Perrig and M.K. Reiter, Bump in the Ether: A framework for securing sensitive user input, in: USENIX Annual Technical Conference, Boston, MA, USA, 2006, pp. 185-198.
-
(2006)
USENIX Annual Technical Conference
, pp. 185-198
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
46
-
-
85018519069
-
Safe passage for passwords and other sensitive data
-
San Diego, CA, USA, February
-
J.M. McCune, A. Perrig and M.K. Reiter, Safe passage for passwords and other sensitive data, in: Network and Distributed System Security Symposium (NDSS'09), San Diego, CA, USA, February 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS'09)
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
48
-
-
79960789287
-
-
Mobile electronic Transactions (MeT) Ltd., (Draft Specification January available at:
-
Mobile electronic Transactions (MeT) Ltd., Personal Transaction Protocol Version 1.0 (Draft Specification), January 2002, available at: http://www.mobiletransaction.org/.
-
(2002)
Personal Transaction Protocol Version 1.0
-
-
-
50
-
-
85077681170
-
A crawler-based study of spyware in the web
-
San Diego, CA, USA, February
-
A. Moshchuk, T. Bragin, S.D. Gribble and H. Levy, A crawler-based study of spyware in the web, in: Network and Distributed System Security (NDSS'06), San Diego, CA, USA, February 2006.
-
(2006)
Network and Distributed System Security (NDSS'06)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.4
-
52
-
-
79960769718
-
-
Netcraft.com, More than 450 phishing attacks used SSL in, available at:
-
Netcraft.com, More than 450 phishing attacks used SSL in 2005, available at: http://news. netcraft.com/archives/2005/12/28/more-than-450-phishing- attacks-used-ssl-in-2005. html.
-
(2005)
-
-
-
53
-
-
79960803861
-
-
Netcraft.com, Phishers hack bank sites, redirect customers, News article, March 27, available at:
-
Netcraft.com, Phishers hack bank sites, redirect customers, News article, March 27, 2006, available at: http://news.netcraft.com/archives/2006/03/27/ phishers-hack-bank-sites-redirect-customers. html.
-
(2006)
-
-
-
54
-
-
79960781222
-
-
Las Vegas, NV, USA, August
-
B. O'Connor, Greater than 1: Defeating "strong" authentication in web applications, in: Defcon 15, Las Vegas, NV, USA, August 2007.
-
(2007)
Greater Than 1: Defeating "Strong" Authentication In Web Applications Defcon
, vol.15
-
-
O'Connor, B.1
-
55
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
-
A. Oprea, D. Balfanz, G. Durfee and D. Smetters, Securing a remote terminal application with a mobile trusted device, in: Annual Computer Security Applications Conference (ACSAC'04), Tucson, AZ, USA, December 2004, pp. 438-447. (Pubitemid 40931099)
-
(2004)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 438-447
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
56
-
-
33750059168
-
Phoolproof phishing prevention
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
B. Parno, C. Kuo and A. Perrig, Phoolproof phishing prevention, in: Financial Cryptography and Data Security (FC'06), Anguilla, British West Indies, February 2006, LNCS, Vol. 4107, Springer- Verlag, 2006, pp. 1-19. (Pubitemid 44577274)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107
, pp. 1-19
-
-
Parno, B.1
Kuo, C.2
Perrig, A.3
-
57
-
-
3142579333
-
Hash visualization: A new technique to improve real-world security
-
Hong Kong, July
-
A. Perrig and D. Song, Hash visualization: A new technique to improve real-world security, in: Cryptographic Techniques and E-Commerce (CrypTEC'99), Hong Kong, July 1999, pp. 131-138.
-
(1999)
Cryptographic Techniques and E-Commerce (CrypTEC'99)
, pp. 131-138
-
-
Perrig, A.1
Song, D.2
-
58
-
-
0038687701
-
Securing passwords against dictionary attacks
-
Washington, DC, USA, November
-
B. Pinkas and T. Sander, Securing passwords against dictionary attacks, in: ACM Computer and Communications Security (CCS'02), Washington, DC, USA, November 2002, pp. 161-170.
-
(2002)
ACM Computer and Communications Security (CCS'02)
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
59
-
-
80053650188
-
All your iFRAMEs point to us
-
San Jose, CA, USA, July
-
N. Provos, P.Mavrommatis,M.A. Rajab and F. Monrose, All your iFRAMEs point to us, in: USENIX Security Symposium, San Jose, CA, USA, July 2008, pp. 1-15.
-
(2008)
USENIX Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
60
-
-
79960779012
-
-
Redmondmag.com, News article, August 7, available at:
-
Redmondmag.com, Coreflood Trojan stole 500G of personal financial data. News article, August 7, 2008, available at: http://redmondmag.com/news/article. asp?editorialsid=10111.
-
(2008)
Coreflood Trojan stole 500G of personal financial data
-
-
-
61
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Baltimore, MD, USA
-
B. Ross, C. Jackson, N. Miyake, D. Boneh and J. Mitchell, Stronger password authentication using browser extensions, in: USENIX Security Symposium, Baltimore, MD, USA, 2005, pp. 17-32.
-
(2005)
USENIX Security Symposium
, pp. 17-32
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
62
-
-
14844314151
-
A PIN-entry method resilient against shoulder surfing
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
V. Roth, K. Richter and R. Freidinger, A PIN-entry method resilient against shoulder surfing, in: ACM Computer and communications Security (CCS'04), Washington, DC, USA, October 2004, pp. 236-245. (Pubitemid 40338205)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
63
-
-
51749092540
-
Secrecy analysis in protocol composition logic
-
IOS Press
-
A. Roy, A. Datta, A. Derek, J.C. Mitchell and J.-P. Seifert, Secrecy analysis in protocol composition logic, in: Formal Logical Methods for System Security and Correctness, IOS Press, 2008.
-
(2008)
Formal Logical Methods for System Security and Correctness
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.-P.5
-
64
-
-
77950964619
-
-
November, Symbian Developer Network article, available at:
-
M. Shackman, Platform security - a technical overview, November 2006, Symbian Developer Network article, available at: http://developer.symbian.com/ main/downloads/papers/plat-sec-tech-overview/platform-security-a-technical- overview.pdf.
-
(2006)
Platform Security - A Technical Overview
-
-
Shackman, M.1
-
65
-
-
79960810681
-
-
SpamFo.co.uk, Has MasterCard gone on a phishing trip, leaving the back door wide open, News article, July 19, available at:
-
SpamFo.co.uk, Has MasterCard gone on a phishing trip, leaving the back door wide open, News article, July 19, 2004, available at: http://spamfo.co.uk/ 2004/07.
-
(2004)
-
-
-
66
-
-
79960798489
-
-
Symantec Security Response Banking in silence, News article, January 14, available at:
-
Symantec Security Response, Banking in silence, News article, January 14, 2008, available at: http://www.securityfocus.com/blogs/485.
-
(2008)
-
-
-
67
-
-
79960823842
-
-
The Sydney Morning Herald, NZ bank adds security online, News article, November 8, available at:
-
The Sydney Morning Herald, NZ bank adds security online, News article, November 8, 2004, available at: http://www.smh.com.au/.
-
(2004)
-
-
-
68
-
-
79960830392
-
-
TheRegister.com, Phishing attack targets one-time passwords, News article, October 12, available at:
-
TheRegister.com, Phishing attack targets one-time passwords, News article, October 12, 2005, available at: http://www.theregister.co.uk/2005/10/ 12/outlaw-phishing/.
-
(2005)
-
-
-
69
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Lowlands, Scarborough, Trinidad and Tobago, February, LNCS, Springer-Verlag, 2007
-
E. Uzun, K. Karvonen and N. Asokan, Usability analysis of secure pairing methods, in:Workshop on Usable Security (USEC'07), Lowlands, Scarborough, Trinidad and Tobago, February 2007, LNCS, Vol. 4886, Springer-Verlag, 2007, pp. 307-327.
-
(2007)
Workshop on Usable Security (USEC'07)
, vol.4886
, pp. 307-327
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
70
-
-
33745603791
-
Message authentication by integrity with public corroboration
-
Lake Arrowhead, CA, USA, September
-
P. van Oorschot, Message authentication by integrity with public corroboration, in: New Security Paradigms Workshop (NSPW'05), Lake Arrowhead, CA, USA, September 2005, pp. 57-63.
-
(2005)
New Security Paradigms Workshop (NSPW'05)
, pp. 57-63
-
-
Van Oorschot, P.1
-
71
-
-
33750906057
-
On countering online dictionary attacks with login histories and humans-in-the-loop
-
DOI 10.1145/1178618.1178619
-
P. van Oorschot and S. Stubblebine, On countering online dictionary attacks with login histories and humans-in-the-loop, ACM Transactions on Information and System Security (TISSEC) 9(3) (2006), 235-258. (Pubitemid 44728674)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.3
, pp. 235-258
-
-
Van Oorschot, P.C.1
Stubblebine, S.2
-
73
-
-
49249126891
-
The Zurich trusted information channel - an efficient defence against man-in-the-middle and malicious software attacks
-
Villach, Austria, March
-
T. Weigold, T. Kramp, R. Hermann, F. Hörin, P. Buhle and M. Baentsch, The Zurich trusted information channel - an efficient defence against man-in-the-middle and malicious software attacks, in: Conference on Trusted Computing and Trust in Information Technologies (TRUST'08), Villach, Austria, March 2008, pp. 75-91.
-
(2008)
Conference on Trusted Computing and Trust in Information Technologies (TRUST'08)
, pp. 75-91
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Hörin, F.4
Buhle, P.5
Baentsch, M.6
-
75
-
-
34250725336
-
Secure web authentication with mobile phones
-
Piscataway, NJ, USA, July
-
M. Wu, S. Garfinkel and R. Miller, Secure web authentication with mobile phones, in: DIMACS Workshop on Usable Privacy and Security Systems, Piscataway, NJ, USA, July 2004.
-
(2004)
DIMACS Workshop on Usable Privacy and Security Systems
-
-
Wu, M.1
Garfinkel, S.2
Miller, R.3
-
76
-
-
84994200819
-
Quantifying effect of network latency and clock drift on time-driven key sequencing
-
Vienna, Austria, July
-
G.G. Xie, C.E. Irvine and T.E. Levin, Quantifying effect of network latency and clock drift on time-driven key sequencing, in: IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'02), Vienna, Austria, July 2002, pp. 35-42.
-
(2002)
IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'02)
, pp. 35-42
-
-
Xie, G.G.1
Irvine, C.E.2
Levin, T.E.3
-
77
-
-
84898190494
-
Phinding phish: An evaluation of anti-phishing toolbars
-
San Diego, CA, USA, February
-
Y. Zhang, S. Egelman, L.F. Cranor and J. Hong, Phinding phish: An evaluation of anti-phishing toolbars, in: Network and Distributed System Security Symposium (NDSS'07), San Diego, CA, USA, February 2007.
-
(2007)
Network and Distributed System Security Symposium (NDSS'07)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.F.3
Hong, J.4
|