Herzberg et al., 2004 - Google Patents
Security and identification indicators for browsers against spoofing and phishing attacksHerzberg et al., 2004
View PDF- Document ID
- 9161419461351613388
- Author
- Herzberg A
- Gbara A
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages to individuals and corporations. In this work, we analyze these attacks, and find …
- 235000010956 sodium stearoyl-2-lactylate 0 abstract 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Herzberg et al. | Trustbar: Protecting (even naive) web users from spoofing and phishing attacks | |
Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
Sotirov et al. | MD5 considered harmful today | |
Ramzan | Phishing attacks and countermeasures | |
Jøsang et al. | Security usability principles for vulnerability analysis and risk assessment | |
JP2011501578A (en) | Method and system for indicating the reliability of secure communications | |
Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
Falk et al. | Analyzing websites for user-visible security design flaws | |
Dubrawsky | How to cheat at securing your network | |
Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
Jøsang et al. | Trust management for e-commerce | |
Jøsang | Trust extortion on the internet | |
Shah et al. | Phishing: An evolving threat | |
Pac | Phishing threats, attack vectors, and mitigation | |
Crispo et al. | WWW security and trusted third party services | |
Li | A contingency framework to assure the user-centred quality and to support the design of anti-phishing software | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Dong et al. | Phishing in smooth waters: The state of banking certificates in the us | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Kolagotla | Enhancing the security of an E-mail by DMARC and DNS data | |
SANCHEZ et al. | My Email Communications Security Assessment (MECSA): 2018 Results | |
Draper-Gil et al. | My email communications security assessment (MECSA): 2018 results | |
Hallam-Baker | Prevention strategies for the next wave of cyber crime |