{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:36Z","timestamp":1750307016277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,3]],"date-time":"2012-08-03T00:00:00Z","timestamp":1343952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,3]]},"DOI":"10.1145\/2345396.2345494","type":"proceedings-article","created":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T12:28:17Z","timestamp":1344342497000},"page":"602-608","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Secret information display based authentication technique towards preventing phishing attacks"],"prefix":"10.1145","author":[{"given":"Gaurav","family":"Varshney","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Roorkee, Uttarakhand, India"}]},{"given":"Anjali","family":"Sardana","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Roorkee, Uttarakhand, India"}]},{"given":"Ramesh Chandra","family":"Joshi","sequence":"additional","affiliation":[{"name":"Chancellor Graphic Era University Dehradun, Uttarakhand, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"491","volume-title":"Mitigation and Testing. In proceedings of the fourth International Conference on Contemporary Computing, IC3-2011","volume":"168","author":"Varshney G.","year":"2011","unstructured":"Varshney , G. , Joshi , R. C. Sardana , A. 2011 . Unified Modeling Technique for Threat Cause Ranking , Mitigation and Testing. In proceedings of the fourth International Conference on Contemporary Computing, IC3-2011 , Communications in Computer and Information Science , 2011, Volume 168 , part 3, pp. 491 -- 500 . Varshney, G., Joshi, R. C. Sardana, A. 2011. Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing. In proceedings of the fourth International Conference on Contemporary Computing, IC3-2011, Communications in Computer and Information Science, 2011, Volume 168, part 3, pp. 491--500."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5120\/881-1252"},{"volume-title":"Anatomy of a Phishing Email. Mail frontier","author":"Christine E. D.","unstructured":"Christine E. D. , Jonathan , J. O. , and Eugene J. K . Anatomy of a Phishing Email. Mail frontier , Inc., Palo Alto, CA, USA. Christine E. D., Jonathan, J. O., and Eugene J. K. Anatomy of a Phishing Email. Mail frontier, Inc., Palo Alto, CA, USA.","key":"e_1_3_2_1_3_1"},{"unstructured":"APWG Anti Phishing Working Group. http:\/\/www.antiphishing.org  APWG Anti Phishing Working Group . http:\/\/www.antiphishing.org","key":"e_1_3_2_1_4_1"},{"unstructured":"Sheng S. Wardman B. Warner G. Carnor L. F. Hong J. and Zhang C. 2009. \"An empirical analysis of phishing blacklists\".  Sheng S. Wardman B. Warner G. Carnor L. F. Hong J. and Zhang C. 2009. \"An empirical analysis of phishing blacklists\".","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"In Proceedings of eCrime Researchers Summit (eCrime).","author":"Toolan F.","year":"2010","unstructured":"Toolan , F. , Carthy , J. , Feature Selection for Spam and Phishing Detection. 2010 . In Proceedings of eCrime Researchers Summit (eCrime). Toolan, F., Carthy, J., Feature Selection for Spam and Phishing Detection. 2010. In Proceedings of eCrime Researchers Summit (eCrime)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1242572.1242660"},{"volume-title":"Proceedings of the NYS Cyber Security Conference.","author":"Chandrashekharan M.","unstructured":"Chandrashekharan , M. , Narayan , K. , and Upadhyaya , S . 2006. Phishing email detection based on structural properties . In Proceedings of the NYS Cyber Security Conference. Chandrashekharan, M., Narayan, K., and Upadhyaya, S. 2006. Phishing email detection based on structural properties. In Proceedings of the NYS Cyber Security Conference.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the DIMACS Workshop on Theft in E-Commerce.","author":"Adida B.","year":"2005","unstructured":"Adida , B. , et. al. 2005 . Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails . In Proceedings of the DIMACS Workshop on Theft in E-Commerce. Adida, B., et. al. 2005. Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails. In Proceedings of the DIMACS Workshop on Theft in E-Commerce."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1242572.1242659"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/WKDD.2010.108"},{"unstructured":"DKIM.org http:\/\/www.dkim.org.  DKIM.org http:\/\/www.dkim.org.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-642-20573-6_21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ITNG.2011.38"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/11889663_1"},{"unstructured":"Fraser N. The usability of picture password. Unpublished.  Fraser N. The usability of picture password. Unpublished .","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Security '05 Technical Program.","author":"Ross B.","year":"2005","unstructured":"Ross , B. 2005 . Stronger Password Authentication Using Browser Extensions . In Proceedings of the Security '05 Technical Program. Ross, B. 2005. Stronger Password Authentication Using Browser Extensions. In Proceedings of the Security '05 Technical Program."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/MSP.2006.50"},{"key":"e_1_3_2_1_20_1","first-page":"109","volume-title":"Proceedings of Mobile IT Convergence (ICMIC)","author":"Kyeongwon C.","year":"2011","unstructured":"Kyeongwon , C. et. al. 2011 . A mobile based antiphishing authentication scheme using QR code . In Proceedings of Mobile IT Convergence (ICMIC) pp. 109 -- 113 . Kyeongwon, C. et. al. 2011. A mobile based antiphishing authentication scheme using QR code. In Proceedings of Mobile IT Convergence (ICMIC) pp. 109--113."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1240624.1240760"},{"volume-title":"Proceedings of the 1st USENIX Workshop on Hot Topics in Security, HOTSEC'06","author":"Florencio D.","unstructured":"Florencio , D. and Herley , C . 2006. Password Rescue: A New Approach to Phishing Prevention . In Proceedings of the 1st USENIX Workshop on Hot Topics in Security, HOTSEC'06 . Florencio, D. and Herley, C. 2006. Password Rescue: A New Approach to Phishing Prevention. In Proceedings of the 1st USENIX Workshop on Hot Topics in Security, HOTSEC'06.","key":"e_1_3_2_1_22_1"}],"event":{"sponsor":["ISCA International Society for Computers and Their Applications","RPS Research Publishing Services"],"acronym":"ICACCI '12","name":"ICACCI '12: 2012 International Conference on Advances in Computing, Communications and Informatics","location":"Chennai India"},"container-title":["Proceedings of the International Conference on Advances in Computing, Communications and Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2345396.2345494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2345396.2345494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:07Z","timestamp":1750236547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2345396.2345494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,3]]},"references-count":22,"alternative-id":["10.1145\/2345396.2345494","10.1145\/2345396"],"URL":"https:\/\/doi.org\/10.1145\/2345396.2345494","relation":{},"subject":[],"published":{"date-parts":[[2012,8,3]]},"assertion":[{"value":"2012-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}