Web wallet: preventing phishing attacks by revealing user intentions
暂无分享,去创建一个
Min Wu | Rob Miller | Greg Little | Rob Miller | Greg Little | Min Wu
[1] A Treisman,et al. Feature analysis in early vision: evidence from search asymmetries. , 1988, Psychological review.
[2] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[3] Dan Boneh,et al. Proceedings of the 11th USENIX Security Symposium , 2002 .
[4] Sean W. Smith,et al. Web Spoofing Revisited: SSL and Beyond , 2002 .
[5] Simson L. Garfinkel,et al. Secure Web Authentication with Mobile Phones , 2004 .
[6] John Sören Pettersson,et al. Making PRIME usable , 2005, SOUPS '05.
[7] Ronald L. Rivest,et al. Lightweight Encryption for Email , 2005, SRUTI.
[8] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[9] Sean W. Smith,et al. Trusted paths for browsers , 2002, TSEC.
[10] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[11] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[12] Xiaotie Deng,et al. An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.
[13] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[14] Min Wu. Fighting phishing at the user interface , 2006 .
[15] Michael B. Jones,et al. Design Rationale behind the Identity Metasystem Architecture , 2007, ISSE.