Interact-2010 2010
DOI: 10.1109/interact.2010.5706185
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing online security by providing a 3 factor authentication system to counter-attack 'Phishing'

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The aim of social engineering in a phishing context is to manipulate users into divulging personal or financial information (Mishra et al, 2012; Nirmal et al, 2010). To that end, fraudsters exploit internet users’ social, psychological and cognitive vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The aim of social engineering in a phishing context is to manipulate users into divulging personal or financial information (Mishra et al, 2012; Nirmal et al, 2010). To that end, fraudsters exploit internet users’ social, psychological and cognitive vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A three factor authentication scheme [8] named Phish-Secure focuses to counter attack phishing. Here as a first factor of authentication, an image similarity detection is done which helps in finding out which page the user tends to visit, then it is checked for Phishing .For this purpose a system captures the image of a webpage in a particular resolution in the required format.…”
Section: Related Workmentioning
confidence: 99%