Last update: Sat Oct 14 03:06:25 MDT 2017
@Article{Cranor:2008:CSC, author = "Lorrie Faith Cranor", title = "Computer Security: Can Phishing Be Foiled?", journal = j-SCI-AMER, volume = "299", number = "6", pages = "104--110", month = dec, year = "2008", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican1208-104", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Fri May 17 10:29:51 MDT 2013", bibsource = "http://www.math.utah.edu/pub/tex/bib/sciam2000.bib", URL = "http://www.nature.com/scientificamerican/journal/v299/n6/full/scientificamerican1208-104.html; http://www.nature.com/scientificamerican/journal/v299/n6/pdf/scientificamerican1208-104.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", }