Sid Stamm
Sid Stamm
Associate Professor of Computer Science and Software Engineering
Verifierad e-postadress på rose-hulman.edu - Startsida
Titel
Citeras av
Citeras av
År
Certified lies: Detecting and defeating government interception attacks against ssl (short paper)
C Soghoian, S Stamm
International Conference on Financial Cryptography and Data Security, 250-259, 2011
2462011
Reining in the web with content security policy
S Stamm, B Sterne, G Markham
Proceedings of the 19th international conference on World wide web, 921-930, 2010
2342010
Drive-by pharming
S Stamm, Z Ramzan, M Jakobsson
Indiana University Technical Report TR641, http://www. symantec. com …, 2006
1152006
Drive-by pharming
S Stamm, Z Ramzan, M Jakobsson
International Conference on Information and Communications Security, 495-506, 2007
1102007
Invasive browser sniffing and countermeasures
M Jakobsson, S Stamm
Proceedings of the 15th international conference on World Wide Web, 523-532, 2006
992006
Combating click fraud via premium clicks
A Juels, S Stamm, M Jakobsson
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 1-10, 2007
602007
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
412007
Web camouflage: Protecting your clients from browser-sniffing attacks
M Jakobsson, S Stamm
IEEE Security and Privacy 5 (6), 16-24, 2007
232007
Implementing Trusted Terminals with a and SITDRM
S Stamm, NP Sheppard, R Safavi-Naini
Electronic Notes in Theoretical Computer Science 197 (1), 73-85, 2008
202008
Active cookies for browser authentication
A Juels, M Jakobsson, S Stamm
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
152007
Phishing for clues: Inferring context using cascading style sheets and browser history
M Jakobsson, T Jagatic, S Stamm
www. browser-recon. info, 2007
122007
Mixed nuts: atypical classroom techniques for computer science courses
S Stamm
Crossroads 10 (4), 3-3, 2004
11*2004
Injecting csp for fun and security
C Kerschbaumer, S Stamm, S Brunthaler
Proceedings of the 2nd International Conference on Information Systems …, 2016
92016
Handbook of Financial Cryptography and Security
M Belenkiy, F Brandt, A Kiayias, J Zhou, MT Dashti, S Mauw, ...
9*
Contextual Identity: Freedom to be All Your Selves
M Chew, S Stamm
72013
Phishing for clues
M Jakobsson, TN Jagatic, S Stamm
www. browser-recon. info, 2008
52008
Anticipating and hardening the web against socio-technical security attacks
SL Stamm
Indiana University, 2009
42009
Practice & prevention of home-router mid-stream injection attacks
S Myers, S Stamm
2008 eCrime Researchers Summit, 1-14, 2008
42008
Privacy-Preserving Polling using Playing Cards.
S Stamm, M Jakobsson
IACR Cryptology ePrint Archive 2005, 444, 2005
42005
Phishing for clues: Inferring context using cascading style sheets and browser history, 2005
M Jakobsson, T Jagatic, S Stamm
Referenced, 2005
42005
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20