The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2008
DOI: 10.1109/ipdps.2008.4536554
|View full text |Cite
|
Sign up to set email alerts
|

Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2009
2009

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Due to the availability of trustable LI, VoIP ECs can be redirected to the correct, responsible PSAP and callers can be located reliably. A second use case addressing protection against phishing attacks is discussed in [22].…”
Section: Resultsmentioning
confidence: 99%
“…Due to the availability of trustable LI, VoIP ECs can be redirected to the correct, responsible PSAP and callers can be located reliably. A second use case addressing protection against phishing attacks is discussed in [22].…”
Section: Resultsmentioning
confidence: 99%
“…As proposed in [2], [3], the IPclip mechanism can be used for various use cases such as supporting VoIP ECs, countering phishing threats and in an anti-spam scenario. Due to IPclip's manifold fields of application, it constitutes a contribution to extending and supporting network-based services offered by consumer electronics.…”
Section: B Use Casesmentioning
confidence: 99%