-
1
-
-
85077519910
-
Detecting web bugs with bugnosis: Privacy advocacy through education
-
Springer-Verlag, to appear
-
A. Alsaid, D. Martin. “Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education.” 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, to appear.
-
2nd Workshop on Privacy Enhancing Technologies
-
-
Alsaid, A.1
Martin, D.2
-
2
-
-
23244438835
-
Making something look hacked when it isn’t
-
December
-
R.J. Barbalace. “Making something look hacked when it isn’t.” The Risks Digest, 21.16, December 2000.
-
(2000)
The Risks Digest
, vol.21
, Issue.16
-
-
Barbalace, R.J.1
-
7
-
-
0033295882
-
The nature of a usable PKI
-
C. Ellison. “The Nature of a Usable PKI.” Computer Networks. 31: 823-830. 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 823-830
-
-
Ellison, C.1
-
9
-
-
0034140877
-
Protecting secret keys with personal entropy
-
C. Ellison, C. Hall, R. Milbert, B. Schneier, “Protecting Secret Keys with Personal Entropy” Future Generation Computer Systems. Volume. 16, 2000, pp. 311-318.
-
(2000)
Future Generation Computer Systems
, vol.16
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
11
-
-
85077573006
-
-
Gecko DOM Reference. http://www.mozilla.org/docs/dom/domref/dom_window_ref. html
-
Gecko DOM Reference
-
-
-
14
-
-
85077628427
-
-
Konqueror. http://www.konqueror.org/konq-browser.html
-
Konqueror. http://www.konqueror.org/konq-browser.html
-
-
-
-
15
-
-
23244468095
-
Extra! extra!: Internet hoax, get the details
-
April 8
-
M. Maremont. “Extra! Extra!: Internet Hoax, Get the Details.” The Wall Street Journal. April 8, 1999.
-
(1999)
The Wall Street Journal
-
-
Maremont, M.1
-
16
-
-
85077573964
-
-
The Mozilla Organization. http://www.mozilla.org/download-mozilla.html
-
The Mozilla Organization. http://www.mozilla.org/download-mozilla.html
-
-
-
-
19
-
-
84860982229
-
-
Oal Ridge National Laboratory. April 23
-
J. Rome. “Compartmented Mode Workstations.” Oal Ridge National Laboratory. http://www.ornl.gov/~jar/doecmw.pdf April 23, 1995.
-
(1995)
Compartmented Mode Workstations
-
-
Rome, J.1
-
20
-
-
85077558557
-
-
Lit. Rel. 16266, 70 S.E.C. Docket 1187 Aug. 30
-
S.E.C. v. Gary D. Hoke, Jr. Lit. Rel. No. 16266, 70 S.E.C. Docket 1187 (Aug. 30, 1999). http://www.sec.gov/litigation/litreleases/lr16266.htm
-
(1999)
S.E.C. V. Gary D. Hoke, Jr.
-
-
-
22
-
-
21644485287
-
WebAlps: A survey of e-commerce privacy and security applications
-
September
-
S.W. Smith. “WebALPS: A Survey of E-Commerce Privacy and Security Applications.” ACM SIGecom Exchanges. Volume 2.3, September 2001.
-
(2001)
ACM SIGecom Exchanges
, vol.2
, Issue.3
-
-
Smith, S.W.1
-
23
-
-
0034809926
-
Practical server privacy using secure coprocessors
-
S.W. Smith, D. Safford. “Practical Server Privacy Using Secure Coprocessors.” IBM Systems Journal. 40: 683-695. 2001.
-
(2001)
IBM Systems Journal
, vol.40
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
24
-
-
84857118794
-
Scam artist copies PayPal web site
-
July 21, Now expired, but related discussion exists at
-
B. Sullivan. “Scam artist copies PayPal Web site.” MSNBC. July 21, 2000. (Now expired, but related discussion exists at http://www.landfield.com/isn/mail-archive/2000/Jul/0100.html)
-
(2000)
MSNBC
-
-
Sullivan, B.1
-
27
-
-
85084161247
-
Why johnny can’t encrypt: A usability evaluation of PGP 5.0
-
A. Whitten and J.D. Tygar. “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.” USENIX Security, 1999.
-
(1999)
USENIX Security
-
-
Whitten, A.1
Tygar, J.D.2
-
28
-
-
23244449257
-
-
Master’s Thesis. Department of Computer Science, Dartmouth College. May to appear
-
Z. Ye. Building Trusted Paths for Web Browsers. Master’s Thesis. Department of Computer Science, Dartmouth College. May 2002 (to appear).
-
(2002)
Building Trusted Paths for Web Browsers
-
-
Ye, Z.1
-
29
-
-
2642577193
-
-
Technical Report TR2002-417, Department of Computer Science, Dartmouth College. February
-
E. Ye, Y. Yuan, S.W. Smith. Web Spoofing Revisited: SSL and Beyond. Technical Report TR2002-417, Department of Computer Science, Dartmouth College. February 2002.
-
(2002)
Web Spoofing Revisited: SSL and beyond
-
-
Ye, E.1
Yuan, Y.2
Smith, S.W.3
|