Authors: Nektarios Leontiadis, Tyler Moore, Nicolas Christin
Contributors: The Pennsylvania State University CiteSeerX Archives
Superior Title: http://www.andrew.cmu.edu/user/nicolasc/publications/LMC-EC13.pdf.
Subject Terms: Categories and Subject Descriptors, K.4.1 [Public Policy Issues, Abuse and crime involving computers General Terms, Measurement, Security, Economics Additional Key Words and Phrases, Online crime, pharmacies, web frauds, search-engine poisoning
File Description: application/pdf
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer- Communication Networks, General—Security and protection, H.5.2 [Information Interfaces and Presentation, User Interfaces—Graphical user interfaces, K.4.2 [Computers and Society, Social issues—Abuse and crime involving computers. General Terms Design, Experimentation, Security, Human Factors. Keywords Training, anti-phishing, phishing, embedded training, email, usable privacy
File Description: application/pdf
Authors: Pawel Gburzynski
Contributors: The Pennsylvania State University CiteSeerX Archives
Superior Title: http://www.searchforum.org.cn/dataflowgroup/Reading/2004paper/spampaper/contentandstatistical/fighting the spam wars a remailer approach with restrictive aliasing.pdf.
Subject Terms: Categories and Subject Descriptors, C.2.2 [Computer-Communication Networks, Network Protocols—Applications, K.4.1 [Computers and Society, Public Policy Issues—Abuse and crime involving computers General Terms, Algorithms, Security, Human Factors Additional Key Words and Phrases, Electronic mail, spam, privacy
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.623.2514; http://www.searchforum.org.cn/dataflowgroup/Reading/2004paper/spampaper/contentandstatistical/fighting the spam wars a remailer approach with restrictive aliasing.pdf
Availability: http://www.searchforum.org.cn/dataflowgroup/Reading/2004paper/spampaper/contentandstatistical/fighting the spam wars a remailer approach with restrictive aliasing.pdf
Authors: Ryan Henry
Contributors: The Pennsylvania State University CiteSeerX Archives
Superior Title: http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf.
Subject Terms: Categories and Subject Descriptors K.4.1 [Public Policy Issues, Privacy, D.4.6 [Security and Protection, Authentication, cryptographic controls, verification, K.4.2 [Social Issues, Abuse and crime involving computers General Terms Algorithms, Security, Performance. Keywords Anonymous blacklisting
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.379.1877; http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf
Availability: http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf