Sid Stamm
Sid Stamm
Associate Professor of Computer Science and Software Engineering
Verified email at - Homepage
Cited by
Cited by
Certified lies: Detecting and defeating government interception attacks against ssl (short paper)
C Soghoian, S Stamm
International Conference on Financial Cryptography and Data Security, 250-259, 2011
Reining in the web with content security policy
S Stamm, B Sterne, G Markham
Proceedings of the 19th international conference on World wide web, 921-930, 2010
Drive-by pharming
S Stamm, Z Ramzan, M Jakobsson
Indiana University Technical Report TR641, http://www. symantec. com …, 2006
Invasive browser sniffing and countermeasures
M Jakobsson, S Stamm
Proceedings of the 15th international conference on World Wide Web, 523-532, 2006
Combating click fraud via premium clicks
A Juels, S Stamm, M Jakobsson
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 1-10, 2007
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
Web camouflage: Protecting your clients from browser-sniffing attacks
M Jakobsson, S Stamm
IEEE Security and Privacy 5 (6), 16-24, 2007
Implementing Trusted Terminals with a and SITDRM
S Stamm, NP Sheppard, R Safavi-Naini
Electronic Notes in Theoretical Computer Science 197 (1), 73-85, 2008
Phishing for clues: Inferring context using cascading style sheets and browser history
M Jakobsson, T Jagatic, S Stamm
www. browser-recon. info, 2007
Injecting csp for fun and security
C Kerschbaumer, S Stamm, S Brunthaler
Proceedings of the 2nd International Conference on Information Systems …, 2016
Mixed nuts: atypical classroom techniques for computer science courses
S Stamm
Crossroads 10 (4), 3-3, 2004
Handbook of Financial Cryptography and Security
M Belenkiy, F Brandt, A Kiayias, J Zhou, MT Dashti, S Mauw, ...
Contextual Identity: Freedom to be All Your Selves
M Chew, S Stamm
Phishing for clues: Inferring context using cascading style sheets and browser history, 2005
M Jakobsson, T Jagatic, S Stamm
Referenced, 2005
Anticipating and hardening the web against socio-technical security attacks
SL Stamm
Indiana University, 2009
Practice & prevention of home-router mid-stream injection attacks
S Myers, S Stamm
2008 eCrime Researchers Summit, 1-14, 2008
Phishing for clues
M Jakobsson, TN Jagatic, S Stamm
www. browser-recon. info, 2008
Privacy-Preserving Polling using Playing Cards.
S Stamm, M Jakobsson
IACR Cryptology ePrint Archive 2005, 444, 2005
Java engagement for teacher training: An experience report
R Sooriamurthi, A Sengupta, S Menzel, KA Moor, S Stamm, K Borner
34th Annual Frontiers in Education, 2004. FIE 2004., t2D/17-t2D/22 Vol. 1, 2004
The Internet hunt revisited: Personal information accessible via the web
K Connelly, T Jagatic, A Khalil, Y Liu, KA Siek, S Stamm
Proceedings of www 10, 2004
The system can't perform the operation now. Try again later.
Articles 1–20