Protection mechanisms against phishing attacks

6Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the client side, it can be implemented with little additional cost by financial institutions or other web retailers and therefore is a good compromise compared to the other approaches. A big drawback is that it doesn't protect against man-in-the-middle attacks but most of the other approaches don't either. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Plössl, K., Federrath, H., & Nowey, T. (2005). Protection mechanisms against phishing attacks. In Lecture Notes in Computer Science (Vol. 3592, pp. 20–29). Springer Verlag. https://doi.org/10.1007/11537878_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free