메뉴 건너뛰기




Volumn 31, Issue 8, 1999, Pages 861-870

Authenticating public terminals

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC TELLER MACHINES; INTERNET;

EID: 0033294823     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(98)00020-6     Document Type: Article
Times cited : (40)

References (18)
  • 1
    • 85031576667 scopus 로고    scopus 로고
    • Deliverable D02: Preliminary report on basic services, architecture and design
    • SEMPER Consortium SEMPER Project deliverable submitted to the European Commission (available from the authors); see for related information
    • N. Asokan et al., Deliverable D02: Preliminary report on basic services, architecture and design, Technical Report, SEMPER Consortium, 1996, SEMPER Project deliverable submitted to the European Commission (available from the authors); see url: http://www.semper.org for related information.
    • (1996) Technical Report
    • Asokan, N.1
  • 3
    • 0027758414 scopus 로고
    • Why cryptosystems fail
    • in: V. Ashby (Ed.) Fairfax, Virginia, November
    • oss Anderson, Why cryptosystems fail, in: V. Ashby (Ed.), 1st ACM Conf. on Computer and Communications Security, Fairfax, Virginia, November 1993, pp. 215-227.
    • (1993) 1st ACM Conf. on Computer and Communications Security , pp. 215-227
    • Oss, A.1
  • 4
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'93 Springer, Berlin, May
    • S. Brands, D. Chaum, Distance-bounding protocols, in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, Springer, Berlin, May 1993, pp. 344-359.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 7
    • 0004249393 scopus 로고    scopus 로고
    • The SSL Protocol: Version 3.0
    • Internet Draft Will be eventually replaced by TLS
    • A.O. Freier, P. Kariton, P.C. Kocher, The SSL Protocol: Version 3.0, Technical Report, Internet Draft, 1996, Will be eventually replaced by TLS.
    • (1996) Technical Report
    • Freier, A.O.1    Kariton, P.2    Kocher, P.C.3
  • 8
    • 0003048077 scopus 로고
    • The S/Key one-time password system
    • in: D. Nesset (General Chair), R. Shirey (Program Chair) (Eds.) San Diego, CA, February Internet Society
    • N. Haller, The S/Key one-time password system, in: D. Nesset (General Chair), R. Shirey (Program Chair) (Eds.), Symposium on Network and Distributed Systems Security, San Diego, CA, February 1994, Internet Society.
    • (1994) Symposium on Network and Distributed Systems Security
    • Haller, N.1
  • 9
    • 0141481639 scopus 로고    scopus 로고
    • Soft tempest: Hidden data transmission using electromagnetic emanations
    • Portland, OR, April
    • M.G. Kuhn, R.J. Anderson, Soft tempest: hidden data transmission using electromagnetic emanations, Workshop on Information Hiding, Portland, OR, April 1998.
    • (1998) Workshop on Information Hiding
    • Kuhn, M.G.1    Anderson, R.J.2
  • 11
    • 0029712968 scopus 로고    scopus 로고
    • Human-computer cryptography: An attempt
    • in: C. Neuman (Ed.) New Delhi, India, March
    • T. Matsumoto, Human-computer cryptography: an attempt, in: C. Neuman (Ed.), 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996, pp. 68-75.
    • (1996) 3rd ACM Conference on Computer and Communications Security , pp. 68-75
    • Matsumoto, T.1
  • 12
    • 84995399871 scopus 로고
    • Human identification through insecure channel
    • in: Advances in Cryptology - EUROCRYPT'91 Springer, Berlin, April
    • T. Matsumoto, H. Imai, Human identification through insecure channel, in: Advances in Cryptology - EUROCRYPT'91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, April 1991, pp. 409-421.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 13
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • March/April
    • R. Molva, D. Samfat, G. Tsudik, Authentication of mobile users, IEEE Network 8 (2) (March/April 1994) 26-35.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-35
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 14
    • 84958648410 scopus 로고    scopus 로고
    • Visual authentication and identification
    • in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO'97 Springer, Berlin, August
    • M. Naor, B. Pinkas, Visual authentication and identification, in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, August 1997, pp. 323-336.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 323-336
    • Naor, M.1    Pinkas, B.2
  • 15
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December also Xerox Research Report, CSL-78-4, PARC
    • R.M. Needham, M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21 (12) (December 1978) 993-999, also Xerox Research Report, CSL-78-4, PARC.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 16
    • 84926193517 scopus 로고
    • Visual cryptography
    • in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'94 Springer-Verlag, Berlin Germany
    • M. Naor, A. Shamir, Visual cryptography, in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, Berlin Germany, 1994.
    • (1994) Lecture Notes in Computer Science , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 17
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • February
    • A. Pftizmann, B. Pfitzmann, M. Schunter, M. Waidner, Trusting mobile user devices and security modules, IEEE Computer 30 (2) (February 1997) 61-68.
    • (1997) IEEE Computer , vol.30 , Issue.2 , pp. 61-68
    • Pftizmann, A.1    Pfitzmann, B.2    Schunter, M.3    Waidner, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.