An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
- 1 January 2007
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Do security toolbars actually prevent phishing attacks?Published by Association for Computing Machinery (ACM) ,2006
- Why phishing worksPublished by Association for Computing Machinery (ACM) ,2006
- Web walletPublished by Association for Computing Machinery (ACM) ,2006
- Cache cookies for browser authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Trusted paths for browsersACM Transactions on Information and System Security, 2005
- The battle against phishingPublished by Association for Computing Machinery (ACM) ,2005
- A convenient method for securely managing passwordsPublished by Association for Computing Machinery (ACM) ,2005
- The homograph attackCommunications of the ACM, 2002
- The TLS Protocol Version 1.0Published by RFC Editor ,1999