Threat Modelling in User Performed Authentication
Attributed to:
Defending the Weakest Link: Intrusion via Social Engineering
funded by
EPSRC
Abstract
No abstract provided
Bibliographic Information
Digital Object Identifier: http://dx.doi.org/10.1007/978-3-540-88625-9_4
Publication URI: http://dx.doi.org/10.1007/978-3-540-88625-9_4
Type: Book Chapter
Book Title: Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings (2008)
Page Reference: 49-64
ISBN: 978-3-540-88624-2
ISSN: 1436-3798