Sciweavers

51 search results - page 11 / 11
» Analysing a Stream Authentication Protocol Using Model Check...
Sort
View
120
Voted
JCS
2010
135views more  JCS 2010»
15 years 7 days ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...