Using one-time passwords to prevent password phishing attacks

CY Huang, SP Ma, KT Chen - Journal of Network and Computer …, 2011 - Elsevier
Phishing is now a serious threat to the security of Internet users' confidential information.
Basically, an attacker (phisher) tricks people into divulging sensitive information by sending …

The complexity of the homotopy method, equilibrium selection, and Lemke-Howson solutions

PW Goldberg, CH Papadimitriou, R Savani - ACM Transactions on …, 2013 - dl.acm.org
We show that the widely used homotopy method for solving fixpoint problems, as well as the
Harsanyi-Selten equilibrium selection process for games, are PSPACE-complete to …

On instant messaging worms, analysis and countermeasures

M Mannan, PC van Oorschot - Proceedings of the 2005 ACM workshop …, 2005 - dl.acm.org
We provide a collection of minor results on the area of Instant Messaging (IM) worms, which
has received relatively little attention in the formal literature. We review selected IM worms …

Privacy-enhanced sharing of personal content on the web

M Mannan, PC Van Oorschot - … of the 17th international conference on …, 2008 - dl.acm.org
Publishing personal content on the web is gaining increased popularity with dramatic growth
in social networking websites, and availability of cheap personal domain names and hosting …

HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks

M **e, Z Wu, H Wang - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
Instant messaging (IM) has been one of most frequently used malware attack vectors due to
its popularity. Distinct from other malware, it is straightforward for IM malware to find and hit …

Privacy-aware presence management in instant messaging systems

K Loesing, M Dorsch, M Grote… - … Parallel & Distributed …, 2006 - ieeexplore.ieee.org
Information about online presence allows participants of instant messaging (IM) systems to
determine whether their prospective communication partners are able to answer their …

[PDF][PDF] A systematic characterization of IM threats using honeypots

S Antonatos, I Polakis, T Petsas… - ISOC Network and …, 2010 - ics.forth.gr
The popularity of instant messaging (IM) services has recently attracted the interest of
attackers that try to send malicious URLs or files to the contact lists of compromised instant …

Missed instant message notification

P Samdadiya, R Ramanathan, M Boyer - US Patent 8,224,904, 2012 - Google Patents
(57) ABSTRACT A method and system for capturing missed communications is provided. An
enhanced real-time communication system receives a communication from an initiating …

Algorithms with attitude

A Schaum - 2010 IEEE 39th Applied Imagery Pattern …, 2010 - ieeexplore.ieee.org
A new methodology has been developed for creating detection algorithms for the class of
composite hypothesis testing problems. Rather than estimating unknown parameter values …

Catching Instant Messaging Worms with Change-Point Detection Techniques.

G Yan, Z **ao, SJ Eidenbenz - LEET, 2008 - usenix.org
Instant messaging (IM) systems have gained a lot of popularity in recent years. The
increasing number of IM users has lured malware authors to develop more worms and …