-
1
-
-
84889343543
-
-
PassMark Security, Inc.
-
PassMark Security, Inc. http://www.passmarksecurity.com.
-
-
-
-
2
-
-
84889447238
-
Science and Transportation Hearing on Identity Theft and Data Broker Services
-
Testimony of Kurt Sanford before the US Senate Committee on Commerce, May 10
-
Testimony of Kurt Sanford before the US Senate Committee on Commerce, Science and Transportation Hearing on Identity Theft and Data Broker Services, May 10 2005.
-
(2005)
-
-
-
3
-
-
80455175790
-
Lightweight signatures for email
-
draft of June 18, to appear
-
B. Adida, D. Chau, S. Hohenberger, and R. L. Rivest. Lightweight signatures for email, draft of June 18, 2005; to appear.
-
(2005)
-
-
Adida, B.1
Chau, D.2
Hohenberger, S.3
Rivest, R.L.4
-
4
-
-
47749110775
-
DomainKeys identified email (DKIM)
-
Internet Draft, October
-
E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, and M. Thomas. DomainKeys identified email (DKIM). Internet Draft, October 2005.
-
(2005)
-
-
Allman, E.1
Callas, J.2
Delany, M.3
Libbey, M.4
Fenton, J.5
Thomas, M.6
-
5
-
-
0038304275
-
Advanced SQL injection in SQL Server applications
-
Technical report, NGSSoftware Insight Security Research technical report
-
C. Anley. Advanced SQL injection in SQL Server applications. Technical report, NGSSoftware Insight Security Research technical report, 2002.
-
(2002)
-
-
Anley, C.1
-
6
-
-
0004304523
-
The AuthA protocol for password-based authenticated key exchange
-
Contribution to IEEE PI363.2, March
-
M. Bellare and P. Rogaway. The AuthA protocol for password-based authenticated key exchange. Contribution to IEEE PI363.2, March 2000.
-
(2000)
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84889476694
-
Password authenticated diffie-hellman exchange (PAK)
-
Internet Draft, October
-
A. Brusilovsky. Password authenticated diffie-hellman exchange (PAK). Internet Draft, October 2005.
-
(2005)
-
-
Brusilovsky, A.1
-
8
-
-
33846469356
-
Client-side defense against web-based identity theft
-
In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February
-
N. Chou, R. Ledesma, Y. Teraguchi, and J. Mitchell. Client-side defense against web-based identity theft. In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February 2004.
-
(2004)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.4
-
9
-
-
51749091237
-
Domain-based email authentication using public-keys advertised in the DNS (Do-mainKeys)
-
Internet Draft, September
-
M. Delany. Domain-based email authentication using public-keys advertised in the DNS (Do-mainKeys). Internet Draft, September 2005.
-
(2005)
-
-
Delany, M.1
-
10
-
-
84889273679
-
Identified internet mail
-
Internet Draft, May
-
J. Fenton and M. Thomas. Identified internet mail. Internet Draft, May 2005.
-
(2005)
-
-
Fenton, J.1
Thomas, M.2
-
12
-
-
84889340547
-
-
Goodmail. CertifiedEmail service
-
Goodmail. CertifiedEmail service, http://www.goodmailsysteras.com/certifiedmail/.
-
-
-
-
13
-
-
62349096287
-
Screen-oriented technique for reducing the incidence of shoulder surfing
-
In Security and Management '05. Las Vegas, June
-
B. Hoanca and K. Mock. Screen-oriented technique for reducing the incidence of shoulder surfing. In Security and Management '05. Las Vegas, June 2005.
-
(2005)
-
-
Hoanca, B.1
Mock, K.2
-
14
-
-
33746292743
-
Strong password-only authenticated key exchange
-
Submission to IEEE P1363.2, September
-
D. P. Jablon. Strong password-only authenticated key exchange. Submission to IEEE P1363.2, September 1996.
-
(1996)
-
-
Jablon, D.P.1
-
16
-
-
84889276397
-
Eliminating spam and enabling email privacy through the use of programmable email addresses
-
Technical report, Titan Key Software technical report, August
-
P. Kay. Eliminating spam and enabling email privacy through the use of programmable email addresses. Technical report, Titan Key Software technical report, August 2004.
-
(2004)
-
-
Kay, P.1
-
17
-
-
84889425210
-
Computers seized in data-theft probe
-
Washington Post, May 19
-
B. Krebs. Computers seized in data-theft probe. Washington Post, May 19 2005.
-
(2005)
-
-
Krebs, B.1
-
18
-
-
38149126746
-
Summary of AMP (authentication and key agreement via memorable passwords)
-
Submission to IEEE 1363.2, August
-
T. Kwon. Summary of AMP (authentication and key agreement via memorable passwords). Submission to IEEE 1363.2, August 2003.
-
(2003)
-
-
Kwon, T.1
-
19
-
-
38549105180
-
Sender ID: Authenticating e-mail
-
Internet Draft, May
-
J. Lyon and M. Wong. Sender ID: Authenticating e-mail. Internet Draft, May 2005.
-
(2005)
-
-
Lyon, J.1
Wong, M.2
-
20
-
-
0013410282
-
Secure network authentication with password identification
-
Submission to IEEE 1363.2, July
-
P. MacKenzie and R. Swaminathan. Secure network authentication with password identification. Submission to IEEE 1363.2, July 1999.
-
(1999)
-
-
MacKenzie, P.1
Swaminathan, R.2
-
21
-
-
84889359790
-
The SecurlD? SASL mechanism
-
IETF RFC 2808, April
-
M. Nystrom. The SecurlD? SASL mechanism. IETF RFC 2808, April 2000.
-
(2000)
-
-
Nystrom, M.1
-
22
-
-
3042546730
-
HTML code injection and cross-site scripting
-
Technical report, Technicallnfo
-
G. Ollmann. HTML code injection and cross-site scripting. Technical report, Technicallnfo.
-
-
-
Ollmann, G.1
-
23
-
-
84889403836
-
Advanced cross-site-scripting with real-time remote attacker
-
Technical report, Avaya Labs, February
-
A. Rager. Advanced cross-site-scripting with real-time remote attacker. Technical report, Avaya Labs, February 2005.
-
(2005)
-
-
Rager, A.1
-
24
-
-
84889494218
-
Optimal time to patch revisited
-
RTFM.com working paper
-
E. Rescorla. Optimal time to patch revisited. RTFM.com working paper.
-
-
-
Rescorla, E.1
-
25
-
-
84863469085
-
Stronger password authentication using browser extensions
-
In Proceedings of the 14th Usenix Security Symposium
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th Usenix Security Symposium, 2005.
-
(2005)
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
26
-
-
62349114967
-
Shoulder surfing resistant graphical passwords
-
Draft of April
-
L. Sobrado and J. C. Birget. Shoulder surfing resistant graphical passwords. http://clam.rutgers.edu/~birget/grPssw/srgp.pdf, Draft of April 2005.
-
(2005)
-
-
Sobrado, L.1
Birget, J.C.2
-
27
-
-
38349038696
-
Sender policy framework (SPF) for authorizing use of domains in e-mail
-
Internet Draft, June
-
M. Wong and W. Schlitt. Sender policy framework (SPF) for authorizing use of domains in e-mail. Internet Draft, June 2005.
-
(2005)
-
-
Wong, M.1
Schlitt, W.2
-
28
-
-
84889273055
-
Do security toolbars actually present phishing attacks?
-
In Symposium On Usable Privacy and Security
-
M. Wu, R. Miller, and S. Garfinkel. Do security toolbars actually present phishing attacks? In Symposium On Usable Privacy and Security 2005.
-
(2005)
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
29
-
-
0003331619
-
The secure remote password protocol
-
In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, March
-
T. Wu. The secure remote password protocol. In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, March 1998.
-
(1998)
-
-
Wu, T.1
|