메뉴 건너뛰기




Volumn , Issue , 2006, Pages 67-

A mobile based approach to strong authentication on Web

Author keywords

[No Author keywords available]

Indexed keywords

BLUETOOTH; MOBILE PHONES; PERSONAL COMPUTERS; SERVERS; USER INTERFACES; WIRELESS NETWORKS; WORLD WIDE WEB;

EID: 43549095932     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCGI.2006.2     Document Type: Conference Paper
Times cited : (14)

References (10)
  • 1
    • 4544376760 scopus 로고    scopus 로고
    • W., Al-Qayedi A., Mabrouk A., Zahro A., Combined web/mobile authentication for Secure Web Access Control, IEEE Wireless Communications and Networking Conference WCNC2004, Atlanta (USA), 2004.
    • [Adi] W., Al-Qayedi A., Mabrouk A., Zahro A., "Combined web/mobile authentication for Secure Web Access Control", IEEE Wireless Communications and Networking Conference WCNC2004, Atlanta (USA), 2004.
  • 2
    • 43549102031 scopus 로고    scopus 로고
    • N., An overview of Bluetooth security, SANS Institute, 2001.
    • [Anand] N., "An overview of Bluetooth security", SANS Institute, 2001.
  • 3
    • 43549117775 scopus 로고    scopus 로고
    • J, Preneel B., and Vandewalle J., Combining world wide web and wireless security, Proceedings of IFIP I-NetSec, Leuven (Belgium), 2001.
    • [Claessens] J, Preneel B., and Vandewalle J., "Combining world wide web and wireless security", Proceedings of IFIP I-NetSec, Leuven (Belgium), 2001.
  • 4
    • 77953070493 scopus 로고    scopus 로고
    • X., Huang G., Min Z., Wenyin L., Xiaoyue L., Detection of Phishing Webpages based on Visual Similarity, International World Wide Web Conference, Chiba (Japan), 2005.
    • [Deng] X., Huang G., Min Z., Wenyin L., Xiaoyue L., "Detection of Phishing Webpages based on Visual Similarity", International World Wide Web Conference, Chiba (Japan), 2005.
  • 5
    • 43549105700 scopus 로고    scopus 로고
    • A., Herzberg A., Protecting (even naïve) web users from spoofing and phishing attacks, Bar-Ilan (Israel), 2004.
    • [Gbara] A., Herzberg A., "Protecting (even naïve) web users from spoofing and phishing attacks", Bar-Ilan (Israel), 2004.
  • 6
    • 43549106878 scopus 로고    scopus 로고
    • M., Wetzel S., Security weakness in Bluetooh, Murray Hill (USA), 2001.
    • [Jakobsson] M., Wetzel S., "Security weakness in Bluetooh", Murray Hill (USA), 2001.
  • 7
    • 43549110566 scopus 로고    scopus 로고
    • [Khu-smith] V, Mitchell C.J, Enhancing ecommerce security using GSM authentication, London (England), 2002.
    • [Khu-smith] V, Mitchell C.J, "Enhancing ecommerce security using GSM authentication", London (England), 2002.
  • 8
    • 33845287964 scopus 로고    scopus 로고
    • [Me G., Strangio] M. A., Dellutri F., Local Authentication with Bluetooth enabled mobile devices, Proceedings of IEEE International Conference on Autonomic and Autonomous Systems, 2005.
    • [Me G., Strangio] M. A., Dellutri F., "Local Authentication with Bluetooth enabled mobile devices", Proceedings of IEEE International Conference on Autonomic and Autonomous Systems, 2005.
  • 9
    • 43549102030 scopus 로고    scopus 로고
    • [Wu M., Garfinkel] S., Miller R., Secure web authentication with mobile phones, MIT Computer Science and Artificial Intelligence Lab.
    • [Wu M., Garfinkel] S., Miller R., "Secure web authentication with mobile phones", MIT Computer Science and Artificial Intelligence Lab.
  • 10
    • 43549104747 scopus 로고    scopus 로고
    • J., The future of phishing, www.net-secutity.org, 2004.
    • [Tuliani] J., "The future of phishing", www.net-secutity.org, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.