1. First Workshop on Human Interactive Proofs,
http://www2.parc.com/istl/groups/did/HIP2002/
(2002)
2. Litan, A.: Phishing Attack Victims Likely Targets for Identity Theft. Gartner Research FT-22-8873 (2004)
3. Loftesness, S.: Responding to Phishing Attacks,
http://www.glenbrook.com/opinions/phishing.htm
(2004)
4. Dhamija, R., Tygar, J.D.: Phishing: A Model Problem for Usability in Privacy and Security (to Appear)
5. Netcraft: SSLs Credibility as Phishing Defense is Tested,
http://news.netcraft.com/archives/2004/03/08/ssls_credibility_as_phishing_defense_is_tested.html
(2004)