Sciweavers

149 search results - page 2 / 30
» Protection Mechanisms Against Phishing Attacks
Sort
View
65
Voted
TOIT
2010
80views more  TOIT 2010»
14 years 10 months ago
BogusBiter: A transparent protection against phishing attacks
Chuan Yue, Haining Wang
88
Voted
SOUPS
2006
ACM
15 years 5 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
118
Voted
GLOBECOM
2008
IEEE
15 years 22 days ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
87
Voted
ICC
2008
IEEE
163views Communications» more  ICC 2008»
15 years 6 months ago
A Virtual Password Scheme to Protect Passwords
—People enjoy the convenience of on-line services, but online environments may bring many risks. In this paper, we discuss how to prevent users’ passwords from being stolen by ...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
CONEXT
2009
ACM
15 years 23 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...