-
1
-
-
58449125009
-
Social effects of phish- ing on e-commerce
-
Netherlands, July
-
S. K. Bajaj, S. Hansen, "Social effects of phish- ing on e-commerce," International Conference on e- Commerce, pp. 215-219, Netherlands, July 2008.
-
(2008)
International Conference on e- Commerce
, pp. 215-219
-
-
Bajaj, S.K.1
Hansen, S.2
-
2
-
-
33745816410
-
Why phishing works
-
Montréal, Canada, Apr.
-
R. Dhamija, J. D. Tygar, and M. Hearst, "Why phishing works," Proceedings SIGCHI Conference Human Factors in Computing Systems, pp. 581-590, Montréal, Canada, Apr. 2006.
-
(2006)
Proceedings SIGCHI Conference Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
84875351552
-
-
Ph.D. thesis, Universitat Pompeu Fabra, Barcelona, Spain
-
A. S. Martino, Security Policies Proposal for E- Banking Services: Anti-Phishing Approach, Ph.D. thesis, Universitat Pompeu Fabra, Barcelona, Spain, 2008.
-
(2008)
Security Policies Proposal for E- Banking Services: Anti-Phishing Approach
-
-
Martino, A.S.1
-
7
-
-
84875334883
-
-
New Zealand State Services Commission, Guidance on multi-factor authentication
-
New Zealand State Services Commission, Guidance on multi-factor authentication, 2010. (http://www.e.govt.nz/standards/e-gif/authentication/guide-multi-factor-auth/chapter3.html)
-
(2010)
-
-
-
9
-
-
84875310413
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group, 2010.(http://www.antiphishing.org/)
-
(2010)
-
-
-
10
-
-
84875301119
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group, Vendor solutions, 2010.(http://www.antiphishing.org/solutions.html)
-
(2010)
Vendor solutions
-
-
-
11
-
-
84875329234
-
-
Phishing costs $20,000,000 for Rus-sian businesses
-
T.Saytarly, Phishing costs $20,000,000 for Rus-sian businesses, 2010.(http://www.crime-research.org/news/14.10.2004/707/)
-
(2010)
-
-
Saytarly, T.1
-
12
-
-
84875314884
-
-
Hispasec Lab, Banking trojuan captures user's screen in video chip
-
Hispasec Lab, Banking trojuan captures user's screen in video chip, 2010.(http://www.hispasec.com/lab-oratorio/bankingtrojancapturevideoclip.pdf)
-
(2010)
-
-
-
14
-
-
84875284201
-
-
OpenDNS
-
OpenDNS, 2010.(http://www.phishtank.com/)
-
(2010)
-
-
-
15
-
-
84875322153
-
-
Wikimedia Foundation, Man in the middleattack
-
Wikimedia Foundation, Man in the middle attack, 2010.(http://www.wikipedia.org/wiki/Man-in-the-middle attack)
-
(2010)
-
-
-
16
-
-
84875304293
-
-
Wikimedia Foundation
-
Wikimedia Foundation, Pharming, 2010.(http://www.wikipedia.org/wiki/Pharming)
-
(2010)
Pharming
-
-
-
17
-
-
84875342456
-
-
Wikimedia Foundation
-
Wikimedia Foundation, Phishing, 2010.(http://www.wikipedia.org/wiki/Phishing)
-
(2010)
Phishing
-
-
-
18
-
-
84875298532
-
-
Wikimedia Foundation
-
Wikimedia Foundation, Secure electronic trans-action, 2010.(http://www.wikipedia.org/wiki/Se-cureelectronictransaction)
-
(2010)
Secure electronic trans-action
-
-
-
20
-
-
34848911641
-
Social phishing
-
Oct.
-
T.N.Jagatic, N.A.Johnson, M.Jakobson, and F.Menczer, "Social phishing," Communications of the ACM, vol.50, no.10, pp.94-100, Oct.2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobson, M.3
Menczer, F.4
-
21
-
-
79951702367
-
Nonce Generation For The Digital Signature Standard
-
July
-
R.S. Katti and R.G. Kavasseri, "Nonce Generation For The Digital Signature Standard," International Journal of Network Security, vol.11, no.1, pp.23-32, July 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 23-32
-
-
Katti, R.S.1
Kavasseri, R.G.2
-
22
-
-
80054070045
-
Secure Internet Applications Based onMo-bile Agents
-
May
-
C.Yang, "Secure Internet Applications Based onMo-bile Agents," International Journal of Network Secu-rity, vol.2, no.3, pp.228-237, May 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.3
, pp. 228-237
-
-
Yang, C.1
|