[PDF][PDF] Phishing detection plug-in toolbar using intelligent Fuzzy-classification mining techniques
M Aburrous, A Khelifi - … conference on soft computing and software …, 2013 - researchgate.net
Detecting phishing website is a complex task which requires significant expert knowledge
and experience. So far, various solutions have been proposed and developed to address …
and experience. So far, various solutions have been proposed and developed to address …
Trusted path, authentication and data security
AT Emigh - US Patent 8,726,369, 2014 - Google Patents
US8726369B1 - Trusted path, authentication and data security - Google Patents
US8726369B1 - Trusted path, authentication and data security - Google Patents Trusted …
US8726369B1 - Trusted path, authentication and data security - Google Patents Trusted …
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce
applications. In Oppliger R, Hauser R, Basin D [SSL/TLS session-aware user authentication …
applications. In Oppliger R, Hauser R, Basin D [SSL/TLS session-aware user authentication …
Digital signatures and electronic documents: A cautionary tale
K Kain, SW Smith, R Asokan - … and Multimedia Security: IFIP TC6/TC11 …, 2002 - Springer
Often, the main motivation for using PKI in business environments is to streamline workflow,
by enabling humans to digitally sign electronic documents, instead of manually signing …
by enabling humans to digitally sign electronic documents, instead of manually signing …
System and method for protecting a computer system from malicious software
AF Rozman, AJ Cioffi - US Patent App. 13/015,186, 2013 - Google Patents
In a computer system, a first electronic data processor is communicatively coupled to a first
memory space and a second memory space. A second electronic data processor is …
memory space and a second memory space. A second electronic data processor is …
Bear: An open-source virtual secure coprocessor based on TCPA
R MacDonald, S Smith, J Marchesini, O Wild - 2003 - digitalcommons.dartmouth.edu
This paper reports on our ongoing project to use TCPA to transform a desktop Linux
machine into a virtual secure coprocessor: more powerful but less secure than higher-end …
machine into a virtual secure coprocessor: more powerful but less secure than higher-end …
Secure enrollment and practical migration for mobile trusted execution environments
Smartphones can implement various security services from mobile banking to security
tokens used for physical access control. System-wide trusted execution environments …
tokens used for physical access control. System-wide trusted execution environments …
Effective protection against phishing and web spoofing
R Oppliger, S Gajek - Communications and Multimedia Security: 9th IFIP …, 2005 - Springer
Phishing and Web spoofing have proliferated and become a major nuisance on the Internet.
The attacks are difficult to protect against, mainly because they target non-cryptographic …
The attacks are difficult to protect against, mainly because they target non-cryptographic …
[PDF][PDF] Trusted e-commerce user agent based on USB Key
D Zhang, P Hu - Proceedings of the International MultiConference of …, 2008 - Citeseer
With the development of e-commerce, the client-side security becomes more and more
important. In order to assure that the transactions behave as what users expect, be aware of …
important. In order to assure that the transactions behave as what users expect, be aware of …
DriverGuard: Virtualization-based fine-grained protection on i/o flows
Most commodity peripheral devices and their drivers are geared to achieve high
performance with security functions being opted out. The absence of strong security …
performance with security functions being opted out. The absence of strong security …