Certified lies: Detecting and defeating government interception attacks against ssl (short paper) C Soghoian, S Stamm International Conference on Financial Cryptography and Data Security, 250-259, 2011 | 265 | 2011 |
Reining in the web with content security policy S Stamm, B Sterne, G Markham Proceedings of the 19th international conference on World wide web, 921-930, 2010 | 242 | 2010 |
Drive-by pharming S Stamm, Z Ramzan, M Jakobsson Indiana University Technical Report TR641, http://www. symantec. com …, 2006 | 116 | 2006 |
Invasive browser sniffing and countermeasures M Jakobsson, S Stamm Proceedings of the 15th international conference on World Wide Web, 523-532, 2006 | 106 | 2006 |
Combating click fraud via premium clicks A Juels, S Stamm, M Jakobsson Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 1-10, 2007 | 61 | 2007 |
Fighting unicode-obfuscated spam C Liu, S Stamm Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 43 | 2007 |
Web camouflage: Protecting your clients from browser-sniffing attacks M Jakobsson, S Stamm IEEE Security and Privacy 5 (6), 16-24, 2007 | 24 | 2007 |
Implementing Trusted Terminals with a and SITDRM S Stamm, NP Sheppard, R Safavi-Naini Electronic Notes in Theoretical Computer Science 197 (1), 73-85, 2008 | 20 | 2008 |
Active cookies for browser authentication A Juels, M Jakobsson, S Stamm Proceedings of the 14th Annual Network and Distributed System Security …, 2007 | 15 | 2007 |
Phishing for clues: Inferring context using cascading style sheets and browser history M Jakobsson, T Jagatic, S Stamm www. browser-recon. info, 2007 | 12 | 2007 |
Mixed nuts: atypical classroom techniques for computer science courses S Stamm Crossroads 10 (4), 3-3, 2004 | 11* | 2004 |
Injecting csp for fun and security C Kerschbaumer, S Stamm, S Brunthaler Proceedings of the 2nd International Conference on Information Systems …, 2016 | 10 | 2016 |
Handbook of Financial Cryptography and Security M Belenkiy, F Brandt, A Kiayias, J Zhou, MT Dashti, S Mauw, ... | 9* | |
Contextual Identity: Freedom to be All Your Selves M Chew, S Stamm | 8 | 2013 |
Phishing for clues M Jakobsson, TN Jagatic, S Stamm www. browser-recon. info, 2008 | 5 | 2008 |
Phishing for clues: Inferring context using cascading style sheets and browser history, 2005 M Jakobsson, T Jagatic, S Stamm Referenced, 2005 | 5 | 2005 |
Anticipating and hardening the web against socio-technical security attacks SL Stamm Indiana University, 2009 | 4 | 2009 |
Practice & prevention of home-router mid-stream injection attacks S Myers, S Stamm 2008 eCrime Researchers Summit, 1-14, 2008 | 4 | 2008 |
Privacy-Preserving Polling using Playing Cards. S Stamm, M Jakobsson IACR Cryptology ePrint Archive 2005, 444, 2005 | 4 | 2005 |
Java engagement for teacher training: An experience report R Sooriamurthi, A Sengupta, S Menzel, KA Moor, S Stamm, K Borner 34th Annual Frontiers in Education, 2004. FIE 2004., t2D/17-t2D/22 Vol. 1, 2004 | 3 | 2004 |