关注
Sid Stamm
Sid Stamm
Associate Professor of Computer Science and Software Engineering
在 rose-hulman.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Certified lies: Detecting and defeating government interception attacks against SSL (short paper)
C Soghoian, S Stamm
International Conference on Financial Cryptography and Data Security, 250-259, 2011
3362011
Reining in the web with content security policy
S Stamm, B Sterne, G Markham
Proceedings of the 19th international conference on World wide web, 921-930, 2010
3052010
Invasive browser sniffing and countermeasures
M Jakobsson, S Stamm
Proceedings of the 15th international conference on World Wide Web, 523-532, 2006
1342006
Drive-by pharming
S Stamm, Z Ramzan, M Jakobsson
Indiana University Technical Report TR641, http://www. symantec. com …, 2006
1302006
Combating click fraud via premium clicks
A Juels, S Stamm, M Jakobsson
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 1-10, 2007
692007
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
542007
Web camouflage: Protecting your clients from browser-sniffing attacks
M Jakobsson, S Stamm
IEEE Security and Privacy 5 (6), 16-24, 2007
332007
Implementing Trusted Terminals with a and SITDRM
S Stamm, NP Sheppard, R Safavi-Naini
Electronic Notes in Theoretical Computer Science 197 (1), 73-85, 2008
222008
Injecting csp for fun and security
C Kerschbaumer, S Stamm, S Brunthaler
Proceedings of the 2nd International Conference on Information Systems …, 2016
152016
Mixed nuts: atypical classroom techniques for computer science courses
S Stamm
Crossroads 10 (4), 3-3, 2004
142004
Phishing for clues: Inferring context using cascading style sheets and browser history
M Jakobsson, T Jagatic, S Stamm
www. browser-recon. info, 2007
122007
Handbook of Financial Cryptography and Security
M Belenkiy, F Brandt, A Kiayias, J Zhou, MT Dashti, S Mauw, ...
11*
Contextual Identity: Freedom to be All Your Selves
M Chew, S Stamm
82013
Practice & prevention of home-router mid-stream injection attacks
S Myers, S Stamm
2008 eCrime Researchers Summit, 1-14, 2008
62008
Phishing for clues
M Jakobsson, TN Jagatic, S Stamm
www. browser-recon. info, 2008
62008
Anticipating and hardening the web against socio-technical security attacks
SL Stamm
Indiana University, 2009
52009
Phishing for clues: Inferring context using cascading style sheets and browser history, 2005
M Jakobsson, T Jagatic, S Stamm
Referenced, 2005
52005
How things Work and Fail
M Jakobsson, J Hodges, A Steingruebl, J Caballero, A Barth, D Song, ...
The Death of the Internet, 57-168, 2012
42012
Privacy-Preserving Polling using Playing Cards.
S Stamm, M Jakobsson
IACR Cryptology ePrint Archive 2005, 444, 2005
42005
JavaScript Breaks Free
M Jakobsson, Z Ramzan, S Stamm
4*
系统目前无法执行此操作,请稍后再试。
文章 1–20