Login / Signup
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Jeffrey Knockel
Jedidiah R. Crandall
Published in:
FOCI (2012)
Keyphrases
</>
third party
communication technologies
personal information
sensitive information
security mechanisms
software architecture
email
mashup
personal data
computer systems
private information
data providers
user interface
countermeasures
trusted third party
reverse logistics