Website spoofing

Known as: WEB spoofing, Microsoft Firefox 2007, Site spoofs 
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2016
012319982016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Web Spoofing lures the user to interact with the fake websites rather than the real ones. The main objective of this attack is to… (More)
  • figure 3
  • figure 5
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract. Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
2006
2006
Most secure web sites use the SSL/TLS protocol for server authentication. SSL/TLS supports mutual authentication, i.e. both… (More)
  • figure 1
  • table 1
Is this relevant?
2006
2006
The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2002
2002
Can users believe what their browsers tell them? Even sophisticated Web users decide whether or not to trust a server based on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2001
2001
The Web is currently the pre-eminent medium for electronic service delivery to remote users. As a consequence, authentication of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1998
1998
We use the Web Spoofing attack reported by Cohen and also the Secure Internet Programming Group at Princeton University to give a… (More)
Is this relevant?
1998
1998
p. 1 The Security of Public Key Cryptosystems Based on Integer Factorization p. 9 A Uniform Approach to Securing Unix… (More)
Is this relevant?