[PDF][PDF] Phishing detection plug-in toolbar using intelligent Fuzzy-classification mining techniques

M Aburrous, A Khelifi - … conference on soft computing and software …, 2013 - researchgate.net
Detecting phishing website is a complex task which requires significant expert knowledge
and experience. So far, various solutions have been proposed and developed to address …

Trusted path, authentication and data security

AT Emigh - US Patent 8,726,369, 2014 - Google Patents
US8726369B1 - Trusted path, authentication and data security - Google Patents
US8726369B1 - Trusted path, authentication and data security - Google Patents Trusted …

SSL/TLS session-aware user authentication revisited

R Oppliger, R Hauser, D Basin - Computers & Security, 2008 - Elsevier
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce
applications. In Oppliger R, Hauser R, Basin D [SSL/TLS session-aware user authentication …

Digital signatures and electronic documents: A cautionary tale

K Kain, SW Smith, R Asokan - … and Multimedia Security: IFIP TC6/TC11 …, 2002 - Springer
Often, the main motivation for using PKI in business environments is to streamline workflow,
by enabling humans to digitally sign electronic documents, instead of manually signing …

System and method for protecting a computer system from malicious software

AF Rozman, AJ Cioffi - US Patent App. 13/015,186, 2013 - Google Patents
In a computer system, a first electronic data processor is communicatively coupled to a first
memory space and a second memory space. A second electronic data processor is …

Bear: An open-source virtual secure coprocessor based on TCPA

R MacDonald, S Smith, J Marchesini, O Wild - 2003 - digitalcommons.dartmouth.edu
This paper reports on our ongoing project to use TCPA to transform a desktop Linux
machine into a virtual secure coprocessor: more powerful but less secure than higher-end …

Secure enrollment and practical migration for mobile trusted execution environments

C Marforio, N Karapanos, C Soriente… - Proceedings of the …, 2013 - dl.acm.org
Smartphones can implement various security services from mobile banking to security
tokens used for physical access control. System-wide trusted execution environments …

Effective protection against phishing and web spoofing

R Oppliger, S Gajek - Communications and Multimedia Security: 9th IFIP …, 2005 - Springer
Phishing and Web spoofing have proliferated and become a major nuisance on the Internet.
The attacks are difficult to protect against, mainly because they target non-cryptographic …

[PDF][PDF] Trusted e-commerce user agent based on USB Key

D Zhang, P Hu - Proceedings of the International MultiConference of …, 2008 - Citeseer
With the development of e-commerce, the client-side security becomes more and more
important. In order to assure that the transactions behave as what users expect, be aware of …

DriverGuard: Virtualization-based fine-grained protection on i/o flows

Y Cheng, X Ding, RH Deng - ACM Transactions on Information and …, 2013 - dl.acm.org
Most commodity peripheral devices and their drivers are geared to achieve high
performance with security functions being opted out. The absence of strong security …