Simple Password Protector
Abstract
Keywords
Full Text:
PDFReferences
R.Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In ACM Symposiumon Usable Security and Privacy (SOUPS ’05), July 2005.
Min Wu et al, Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Symposium On Usable Privacy and Security (SOUPS) 2006, July 12-14, 2006, Pittsburgh, PA, USA.
PassMark Security. Two-Factor Two-Way Authentication. http://www.passmarksecurity.com/
Yue Zhang et al ,CANTINA: A Content-Based Approach to Detecting Phishing Web Sites WWW 2007, May 8–12, 2007, Banff, Alberta, Canada. ACM 978-1-59593-654-7/07/0005.
Passmark Security. Protecting your customers from phishing attacks: an introduction to passmarks. http://www.passmarksecurity.com/, 2005.
Neil Chou et al Famework for client-side defense:spoofguard.
P. K. Sengar and Vijay Kumar , Client-Side Defense against Phishing with PageSafe.
8. Yue, C. and Wang, H. 2010. BogusBiter: A transparent protection against phishing attacks. ACM Trans. Internet Technol. 10, 2, Article 6 (May 2010), 31 pages.DOI=10.11 45/ 1754393.1754395http://doi.acm.org/10.1145/1754393.1754395.
Inturi Sirisha, C. ShobhaBindu,,2011.―Sentry: Transforming Phishing Detection into Automatic Fraud Protection.‖In Proceedings of International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No.2, pp.545-547.
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th USENIX Security Symposium, Baltimore, August 2005.
J. Halderman, B. Waters, and E. Felten. A convenient method for securely managing passwords. In Proceedings of the 14th International World Wide Web Conference, 2005.
Xun Dong et al : Defending the weakest link: phishing websites detection by analysing user behaviours.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.