Proceedings of the 2019 International Electronics Communication Conference 2019
DOI: 10.1145/3343147.3343154
|View full text |Cite
|
Sign up to set email alerts
|

PhishLedger

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Internet users, brand enterprises, browser manufacturers and authorities) with uniform data sharing format and unobstructed sharing channels for common phishing reporting. One way to achieve this is with multi-party phishing data sharing platform based on blockchains [43]. In summary, the methods listed in Table 1 are available to counteract phishing.…”
Section: Phishing Countermeasuresmentioning
confidence: 99%
“…Internet users, brand enterprises, browser manufacturers and authorities) with uniform data sharing format and unobstructed sharing channels for common phishing reporting. One way to achieve this is with multi-party phishing data sharing platform based on blockchains [43]. In summary, the methods listed in Table 1 are available to counteract phishing.…”
Section: Phishing Countermeasuresmentioning
confidence: 99%
“…The consortium blockchain was used to implement the phishing data-sharing technique, as demonstrated by Liu et al [25]. The four distinct node types-reporting, accounting, service, and supervisory-have their respective tasks represented in the suggested model.…”
Section: Comprehensive Reviewmentioning
confidence: 99%