Sciweavers

152 search results - page 3 / 31
» Protecting Users Against Phishing Attacks with AntiPhish
Sort
View
AIMS
2009
Springer
14 years 10 days ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
TELSYS
2010
132views more  TELSYS 2010»
13 years 14 days ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
SOUPS
2006
ACM
13 years 11 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
CONEXT
2009
ACM
13 years 6 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
TRUSTBUS
2005
Springer
13 years 11 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...