A Contingency Framework to Assure the User-Centered Quality and to Support the Design of Anti-Phishing Software
暂无分享,去创建一个
[1] Gurpreet Dhillon,et al. Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..
[2] Hajime Watanabe,et al. PAKE-based mutual HTTP authentication for preventing phishing attacks , 2009, WWW '09.
[3] Edward W. Felten,et al. Password management strategies for online accounts , 2006, SOUPS '06.
[4] Eleni Berki,et al. A usability test of whitelist and blacklist-based anti-phishing application , 2012, MindTrek.
[5] Markus Jakobsson,et al. Designing ethical phishing experiments , 2007, IEEE Technology and Society Magazine.
[6] Markus Jakobsson,et al. Modeling and Preventing Phishing Attacks , 2005, Financial Cryptography.
[7] Tamara Dinev,et al. Why spoofing is serious internet fraud , 2006, CACM.
[8] Reijo Savola,et al. Development of Measurable Security for a Distributed Messaging System , 2010 .
[9] Peter Tarasewich,et al. Improving interface designs to help users choose better passwords , 2006, CHI Extended Abstracts.
[10] José Carlos Brustoloni,et al. Using reinforcement to strengthen users' secure behaviors , 2010, CHI.
[11] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[12] Peter Gutmann,et al. Security Usability , 2005, IEEE Secur. Priv..
[13] Gregory D. Williamson. Enhanced Authentication In Online Banking , 2006 .
[14] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[15] Linfeng Li,et al. Usability evaluation of anti-phishing toolbars , 2007, Journal in Computer Virology.
[16] Yi Mu,et al. Mitigating Phishing with ID-based Online/Offline Authentication , 2008, AISC.
[17] Eleni Berki,et al. Cyber-Identities and Social Life in Cyberspace , 2009 .
[18] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.