메뉴 건너뛰기




Volumn 4886 LNCS, Issue , 2007, Pages 88-103

Using a personal device to strengthen password authentication from an untrusted computer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DIGITAL DEVICES; NETWORK PROTOCOLS; USER INTERFACES;

EID: 38549118817     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77366-5_11     Document Type: Conference Paper
Times cited : (66)

References (36)
  • 1
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group:, July
    • Anti-Phishing Working Group: Phishing Activity Trends Report (July 2006)
    • (2006) Phishing Activity Trends Report
  • 2
    • 38549145118 scopus 로고    scopus 로고
    • Armando et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, Springer, Heidelberg (2005), http://www.avispa-project. org
    • Armando et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, Springer, Heidelberg (2005), http://www.avispa-project. org
  • 3
    • 85084162119 scopus 로고    scopus 로고
    • Hand-held computers can be better smart cards
    • Balfanz, D., Felten, E.: Hand-held computers can be better smart cards. In: USENIX Security (1999)
    • (1999) USENIX Security
    • Balfanz, D.1    Felten, E.2
  • 4
    • 38549130509 scopus 로고    scopus 로고
    • On-line resources for victims of ATM fraud
    • Bond, M.: Phantom withdrawals: On-line resources for victims of ATM fraud, http://www.phantomwithdrawals.com
    • Phantom withdrawals
    • Bond, M.1
  • 5
    • 38549091330 scopus 로고    scopus 로고
    • CA Virus Information Center: Win32.Grams.I February
    • CA Virus Information Center: Win32.Grams.I (February 2005)
    • (2005)
  • 7
    • 84958955276 scopus 로고    scopus 로고
    • The untrusted computer problem and camera-based authentication
    • Mattern, F, Naghshineh, M, eds, Pervasive Computing, Springer, Heidelberg
    • Clarke, et al.: The untrusted computer problem and camera-based authentication. In: Mattern, F., Naghshineh, M. (eds.) Pervasive Computing. LNCS, vol. 2414, pp. 114-124. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2414 , pp. 114-124
    • Clarke1
  • 8
    • 38549172609 scopus 로고    scopus 로고
    • F-Secure. F-Secure virus descriptions: Cabir (June 2004)
    • F-Secure. F-Secure virus descriptions: Cabir (June 2004)
  • 9
    • 38549173873 scopus 로고    scopus 로고
    • F-Secure. F-Secure trojan information pages: Redbrowser.A, (March 2006)
    • F-Secure. F-Secure trojan information pages: Redbrowser.A, (March 2006)
  • 10
    • 38549083894 scopus 로고    scopus 로고
    • Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: An Internet con game. In: National Information Systems Security Conference (October 1997)
    • Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: An Internet con game. In: National Information Systems Security Conference (October 1997)
  • 16
    • 33751032041 scopus 로고    scopus 로고
    • King, et al.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)
    • King, et al.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)
  • 18
    • 79952010430 scopus 로고    scopus 로고
    • Using a personal device to strengthen password authentication from an untrusted computer
    • Technical Report TR-07-11 March
    • Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer, Technical Report TR-07-11 (March 2007), http://www.scs.carleton.ca/research/tech_reports/
    • (2007)
    • Mannan, M.1    van Oorschot, P.C.2
  • 19
    • 38549114809 scopus 로고    scopus 로고
    • Guardian: A framework for privacy control in untrusted environments
    • Technical Report 04-37 University of Massachusetts, Amherst, June
    • Margolin, N.B., Wright, M.K., Levine, B.N.: Guardian: A framework for privacy control in untrusted environments. Technical Report 04-37 (University of Massachusetts, Amherst) (June 2004)
    • (2004)
    • Margolin, N.B.1    Wright, M.K.2    Levine, B.N.3
  • 21
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • McCune et al.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy (2005)
    • (2005) IEEE Symposium on Security and Privacy
    • McCune1
  • 26
    • 38549127936 scopus 로고    scopus 로고
    • Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, Springer, Heidelberg (2004)
    • Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, Springer, Heidelberg (2004)
  • 27
    • 33750059168 scopus 로고    scopus 로고
    • Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, Springer, Heidelberg (2006)
    • Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, Springer, Heidelberg (2006)
  • 28
    • 3142579333 scopus 로고    scopus 로고
    • Hash visualization: A new technique to improve real-world security
    • CrypTEC, July
    • Perrig, A., Song, D.: Hash visualization: A new technique to improve real-world security. In: Cryptographic Techniques and E-Commerce (CrypTEC) (July 1999)
    • (1999) Cryptographic Techniques and E-Commerce
    • Perrig, A.1    Song, D.2
  • 32
    • 38549150518 scopus 로고    scopus 로고
    • Trend Micro: Mobile security, http://www.trendmicro.com/en/products/ mobile/tmms/evaluate/overview.htm
    • Mobile security
  • 35
    • 38549097895 scopus 로고    scopus 로고
    • Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS Workshop on Usable Privacy and Security Systems (July 2004)
    • Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS Workshop on Usable Privacy and Security Systems (July 2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.