{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:16:30Z","timestamp":1725520590178},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893349"},{"type":"electronic","value":"9783540893356"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89335-6_19","type":"book-chapter","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T14:31:45Z","timestamp":1226413905000},"page":"233-245","source":"Crossref","is-referenced-by-count":3,"title":["Pharewell to Phishing"],"prefix":"10.1007","author":[{"given":"Taehwan","family":"Choi","sequence":"first","affiliation":[]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[]},{"given":"Mohamed G.","family":"Gouda","sequence":"additional","affiliation":[]},{"given":"Jorge A.","family":"Cobb","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Ollmann, G.: The Pharming Guide, http:\/\/www.ngssoftware.com\/papers\/ThePharmingGuide.pdf"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: The Proceedings of the Conference on Human Factors in Computing Systems (CHI 2006) (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"19_CR3","unstructured":"Group, A.P.W.: Phising activity trends report, (September 2007), http:\/\/www.antiphishing.org\/reports\/apwg_report_sept_2007.pdf"},{"key":"19_CR4","unstructured":"McMillan, R.: Gartner: Consumers to lose $2.8 billion to phishers in 2006 (2006), http:\/\/www.networkworld.com\/news\/2006\/110906-gartner-consumers-to-lose-28b.html"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., Wright, T.: Transport Layer Security (TLS) Extensions. RFC 4366 (Proposed Standard) (April 2006)","DOI":"10.17487\/rfc4366"},{"key":"19_CR6","unstructured":"Franco, R.: Website identification and extended validation certificates in IE7 and other browsers. IEBlog (November 2005)"},{"key":"19_CR7","unstructured":"PassMark Security, http:\/\/www.passmarksecurity.com"},{"key":"19_CR8","unstructured":"Bank\u00a0of America, http:\/\/www.bankofamerica.com\/privacy\/sitekey\/"},{"key":"19_CR9","unstructured":"Wu, T.: The Secure Remote Password Protocol. In: Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, pp. 97\u2013111 (1998)"},{"key":"19_CR10","unstructured":"Wu, T.: SRP-6: Improvements and Refinements to the Secure Remote Password Protocol. Submission to the IEEE P1363 Working Group"},{"key":"19_CR11","unstructured":"Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: A Convenient Method for Securely Managing Passwords. In: Financial Cryptography (Feburuary 1997)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/BFb0030415","volume-title":"Information Security","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure Applications of Low-Entropy Keys. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 121\u2013134. Springer, Heidelberg (1998)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A Convenient Method for Securely Managing Passwords. In: 14th International World Wide Web Conference (May 2005)","DOI":"10.1145\/1060745.1060815"},{"issue":"13","key":"19_CR14","doi-asserted-by":"publisher","first-page":"3715","DOI":"10.1016\/j.comnet.2007.03.007","volume":"51","author":"M.G. Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: SPP: An anti-phishing single password protocol. Comput. Netw.\u00a051(13), 3715\u20133726 (2007)","journal-title":"Comput. Netw."},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1143120.1143126","volume-title":"SOUPS 2006: Proceedings of the second symposium on Usable privacy and security","author":"K.P. Yee","year":"2006","unstructured":"Yee, K.P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: SOUPS 2006: Proceedings of the second symposium on Usable privacy and security, pp. 32\u201343. ACM, New York (2006)"},{"key":"19_CR16","unstructured":"Choi, T., Son, S., Gouda, M.G.: Pharwell to Phishing: Secure Direction and Redirection over the Web. Technical Report TR-08-19, Austin, TX, USA (April 2008)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89335-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T09:11:09Z","timestamp":1557911469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89335-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893349","9783540893356"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89335-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}