Cited By
View all- Kim SChoi DJin SLee SGroß THansen M(2013)Geo-location based QR-Code authentication scheme to defeat active real-time phishing attackProceedings of the 2013 ACM workshop on Digital identity management10.1145/2517881.2517889(51-62)Online publication date: 8-Nov-2013
- Megaw GFlowerday S(2010)Phishing within e-commerce: A trust and confidence game2010 Information Security for South Africa10.1109/ISSA.2010.5588333(1-8)Online publication date: Aug-2010
- Leung C(2009)Visual security is feeble for anti-phishingProceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication10.5555/1719110.1719138(118-123)Online publication date: 20-Aug-2009
- Show More Cited By