Back to Results
First PageMeta Content
Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing


The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract
Add to Reading List

Document Date: 2012-09-26 16:43:02


Open Document

File Size: 61,00 KB

Share Result on Facebook