Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Zheng DongApu KapadiaJim BlytheL. Jean CampPublished in: eCrime (2015)
Keyphrases
- public key
- real time
- security analysis
- digital signature
- security model
- website
- public key cryptography
- authentication protocol
- image authentication
- signature scheme
- diffie hellman
- secret key
- elliptic curve cryptography
- public key infrastructure
- low cost
- private key
- authentication scheme
- rfid tags
- encryption scheme
- database systems
- blind signature
- anomaly detection
- public key cryptosystem
- high dimensional
- provably secure
- blind signature scheme