Timed Automata based provably correct robot control
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[2] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[3] Nima Kaviani,et al. A two-Factor Authentication System using Mobile Devices to Protect against Untrusted Public Computers , 2007 .
[4] Ali Al-Qayedi,et al. Combined Web/mobile authentication for secure Web access control , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[5] Gianluigi Me,et al. A mobile based approach to strong authentication on Web , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[6] Tyler Moore,et al. An Empirical Analysis of the Current State of Phishing Attack and Defence , 2007, WEIS.
[7] Simson L. Garfinkel,et al. Secure Web Authentication with Mobile Phones , 2004 .
[8] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[9] Jonathan J. Oliver,et al. Anatomy of a Phishing Email , 2004, CEAS.