Identity Theft
暂无分享,去创建一个
[1] Kim Luong. The other side of identity theft: not just a financial concern , 2006, InfoSecCD '06.
[2] Christopher Krügel,et al. Protecting Users against Phishing Attacks , 2006, Comput. J..
[3] Ka-Ping Yee,et al. Passpet: convenient password management and phishing protection , 2006, SOUPS '06.
[4] Stefan A. Robila,et al. Don't be a phish: steps in user education , 2006, ITICSE '06.
[5] G. Bush. Executive Order 13402: Strengthening Federal Efforts To Protect Against Identity Theft , 2006 .
[6] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[7] Hal Berghel. Phishing mongers and posers , 2006, CACM.
[8] Kenji Takahashi,et al. Federated identity management for protecting users from ID theft , 2005, DIM '05.
[9] P. W. Hodgson. The threat to identity from new and unknown malware , 2005 .
[10] David Geer. Security technologies go phishing , 2005, Computer.
[11] Marianne Loock,et al. Characteristics and responsibilities involved in a Phishing attack , 2005 .
[12] A. Abdullah. Protecting your good name: identity theft and its prevention , 2004, InfoSecCD '04.
[13] Tim Berners-Lee,et al. Uniform Resource Locators (URL) , 1994, RFC.
[14] R. Posner. The Federal Trade Commission , 1969 .