To search, Click below search items.
All Published Papers Search Service
Title
TSPass: A Dynamic User Authentication Scheme Based On Time and Space
Author
Xuguang Ren, Xin-Wen Wu, Kun Tang
Vol. 12 No. 10 pp. 45-53
Keywords
Password, Perfect-man-in-the-middle attack, Phishing attack, Reply attack, Dynamic user authentication, Time and space dynamism
A Hybrid Model to Detect Phishing-Sites using Clustering and Bayesian Approach
Bhushan Dasharath Dhamdhere, Kaushal Sudhakar Dhonde, Rohit Gopal Chinchwade
Vol. 15 No. 1 pp. 92-95
Anti Phishing Technique, Bayesian Approach, Data Mining, Database Clustering, Hybrid Model, and Phishing Attack
The Impact of using Mobile Phones on Privacy of Students in the Kingdom of Saudi Arabia
Alanood Alenizi and Esam Khan
Vol. 20 No. 9 pp. 143-157
personal data privacy breach, suspicious URLs, blacklisting, phishing, Phish tank..
Ibrahim Mohammed Alseadoon and Mohd Fairuz Iskandar Othman
Vol. 21 No. 10 pp. 240-244
Security, Phishing, email, behaviour, users.