Publisher
Springer International Publishing
Reference34 articles.
1. Almeshekah, M.H., Atallah, M.J., Spafford, E.H.: Enhancing passwords security using deceptive covert communication. In: IFIP International Information Security and Privacy Conference, pp. 159–173. Springer, Cham (2015)
2. Biedermann, S., Ruppenthal, T., Katzenbeisser, S.: Data-centric phishing detection based on transparent virtualization technologies. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 215–223. IEEE (2014)
3. Blom, A., de Koning Gans, G., Poll, E., De Ruiter, J., Verdult, R.: Designed to fail: a USB-connected reader for online banking. In: Nordic Conference on Secure IT Systems, pp. 1–16. Springer, Cham (2012)
4. Buescher, A., Leder, F., Siebert, T.: Banksafe information stealer detection inside the web browser. In: International Workshop on Recent Advances in Intrusion Detection, pp. 262–280. Springer, Cham (2011)
5. Chow, Y.W., Susilo, W., Yang, G., Au, M.H., Wang, C.: Authentication and transaction verification using QR codes with a mobile device. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 437–451. Springer, Cham (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献