What do they "indicate?"
- 1 May 2006
- journal article
- Published by Association for Computing Machinery (ACM) in Interactions
- Vol. 13 (3) , 45-47
- https://doi.org/10.1145/1125864.1125890
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- User interfaces for privacy agentsACM Transactions on Computer-Human Interaction, 2006
- Do security toolbars actually prevent phishing attacks?Published by Association for Computing Machinery (ACM) ,2006
- Why phishing worksPublished by Association for Computing Machinery (ACM) ,2006
- Trusted paths for browsersACM Transactions on Information and System Security, 2005
- Visual Spoofing of SSL Protected Web Sites and Effective CountermeasuresPublished by Springer Nature ,2005
- Inside risks: semantic network attacksCommunications of the ACM, 2000