Spyware Resistant Web Authentication using Virtual Machines
暂无分享,去创建一个
[1] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[2] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[3] Rob Pike,et al. Security in Plan 9 , 2002, USENIX Security Symposium.
[4] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[5] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[6] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[7] Sean W. Smith,et al. PorKI: making user PKI safe on machines of heterogeneous trustworthiness , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[8] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[9] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[10] David P. Jablon. Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[11] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[12] Thomas D. Wu. The Secure Remote Password Protocol , 1998, NDSS.
[13] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[14] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[15] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[16] Brent Waters,et al. A convenient method for securely managing passwords , 2005, WWW '05.
[17] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[18] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.