Fighting phishing at the user interface
暂无分享,去创建一个
[1] George Cybenko,et al. COGNITIVE HACKING : TECHNOLOGICAL AND LEGAL ISSUES , 2004 .
[2] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[3] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[4] David R. Karger,et al. Breaking the Window Hierarchy to Visualize UI Interconnections , 2022 .
[5] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[6] David E. Culler,et al. A composable framework for secure multi-modal access to Internet services from post-PC devices , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.
[7] Sean W. Smith,et al. Trusted paths for browsers , 2002, TSEC.
[8] Tong Zhang,et al. Text Categorization Based on Regularized Linear Classification Methods , 2001, Information Retrieval.
[9] Amir Herzberg,et al. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks , 2004 .
[10] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[11] J. D. Tygar,et al. WWW electronic commerce and java trojan horses , 1996 .
[12] Ka-Ping Yee,et al. Passpet: convenient password management and phishing protection , 2006, SOUPS '06.
[13] Ka-Ping Yee,et al. Guidelines and Strategies for Secure Interaction Design , 2005 .
[14] Markus Jakobsson,et al. Cache cookies for browser authentication , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[15] Jr. G. Forney,et al. The viterbi algorithm , 1973 .
[16] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[17] Micah Dubinko,et al. Xforms Essentials , 2003 .
[18] Sean W. Smith,et al. Web Spoofing Revisited: SSL and Beyond , 2002 .
[19] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[20] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[21] Xiaotie Deng,et al. An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.
[22] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[23] Mark Delany,et al. Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys) , 2007, RFC.
[24] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[25] David R. Karger,et al. Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.
[26] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[27] Colin Potts,et al. Design of Everyday Things , 1988 .
[28] Michael B. Jones,et al. Design Rationale behind the Identity Metasystem Architecture , 2007, ISSE.
[29] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[30] Ronald L. Rivest,et al. Lightweight Encryption for Email , 2005, SRUTI.
[31] Kori Inkpen Quinn,et al. Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.
[32] Michael Bolin. End-user programming for the Web , 2005 .
[33] A Treisman,et al. Feature analysis in early vision: evidence from search asymmetries. , 1988, Psychological review.
[34] Donald E. Eastlake rd. Electronic Commerce Modeling Language (ECML) Version 2 Specification , 2005 .