Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] W3C (World Wide Web Consortium), P3P specifications 2nd wallets war driving weakest link property 2nd 3rd Web authentication and password hashing proxies web browsers cookies 2nd handling, browser redesign managing helper objects, Privacy Bird implementation informed consent, gatekeepers to browser redesign interaction design, informing users through lock icon on, user understanding of peripheral awareness systems phishing attacks, defending against remote software installation secure communications between secure connections, indicating user tracking web bugs 2nd clickstream tracking, enabling detecting in Bugnosis exoinformation example in Bugnosis, definition of Web Caller-ID antiphishing tool web forums, user feedback web logs clickstreams web mail system, Google Gmail web security ambiguous disclosure forms communications about, P3P user agent design 2nd keystroke biometrics Mozilla Firefox MyDoom virus, scanning logs for password selection, restricting scanning logs user awareness, Bugnosis and user understanding of 2nd web servers as certificate authorities secure communications between web sites Barbi, violating informed consent principles clickstreams, logging credibility assessments fake password prompts forged 2nd 3rd low-fi prototyping mirror online banking example P3P policies, human-readable version password selection, existing advice on pop-ups, Bugnosis design trusted designs 2nd 3rd examples influence of time underground, attackers using Whitten, Alma Wilkerson, Matt WindowBox project, Chameleon and Windows 2000 cipher utility Windows systems cipher utility drag-and-drop installation, adopting email access, securing file access, securing file extensions, hidden hotkeys, designating reserved overwriting data and P3P user agents on software installation/removal viruses/worms Windows XP ActiveX dialogs cipher utility Service Pack 2 Bugnosis architecture and case study of pop-up blocking wireless networks PKI and 2nd war driving Wizard of Oz study work group applications, securing with iPKIs World Wide Web Consortium (W3C), P3P specifications 2nd worms Wu, Min |