메뉴 건너뛰기




Volumn 5222 LNCS, Issue , 2008, Pages 401-420

One-time password access to any server without changing the server

Author keywords

Authentication; One time passwords; Passwords; Replay resistance

Indexed keywords

CELL PHONES; ONE-TIME PASSWORDS; PASSWORDS; REPLAY RESISTANCE;

EID: 56649111147     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85886-7_28     Document Type: Conference Paper
Times cited : (18)

References (32)
  • 1
    • 56649088444 scopus 로고    scopus 로고
    • http://labs.zarate.org/passwd/
  • 2
    • 56649120790 scopus 로고    scopus 로고
    • http://www.cl.cam.ac.uk/~mgk25/otpw.html
  • 3
    • 56649105443 scopus 로고    scopus 로고
    • http://www.rsasecurity.com
  • 4
    • 56649100879 scopus 로고    scopus 로고
    • http://www.kyps.net
  • 5
    • 56649089981 scopus 로고    scopus 로고
    • http://www.csoft.co.uk/sms/character_sets/encoding.htm
  • 6
    • 56649108315 scopus 로고    scopus 로고
    • http://www.jmarshall.com/tools/cgiproxy
  • 7
    • 56649091507 scopus 로고    scopus 로고
    • http://www.clickatell.com
  • 8
    • 56649088443 scopus 로고    scopus 로고
    • http://www.fiddlertool.com
  • 9
    • 56649085425 scopus 로고    scopus 로고
    • http://www.xk72.com/charles/
  • 10
    • 56649113128 scopus 로고    scopus 로고
    • http://www.portswigger.net/proxy
  • 11
    • 56649106757 scopus 로고    scopus 로고
    • Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
    • Herley, C., Florêncio, D.: How To Login From an Internet Café without Worrying about Keyloggers. In: Symp. on Usable Privacy and Security (2006)
  • 12
    • 70450252840 scopus 로고    scopus 로고
    • Johnny Can Obfuscate: Beyond Mother's Maiden Name
    • Cheswick, W.: Johnny Can Obfuscate: Beyond Mother's Maiden Name. In: Proc. Usenix HotSec (2006)
    • (2006) Proc. Usenix HotSec
    • Cheswick, W.1
  • 13
    • 56649111144 scopus 로고    scopus 로고
    • Coskun, B., Herley, C.: Can Something You Know be Saved? In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, 5222, pp. 421-440. Springer, Heidelberg (2008)
    • Coskun, B., Herley, C.: Can "Something You Know" be Saved? In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 421-440. Springer, Heidelberg (2008)
  • 14
    • 35348884906 scopus 로고    scopus 로고
    • A Large-Scale Study of Web Password Habits
    • Banff
    • Florêncio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: WWW 2007, Banff (2007)
    • (2007) WWW
    • Florêncio, D.1    Herley, C.2
  • 15
    • 56649103994 scopus 로고    scopus 로고
    • Florêncio, D., Herley, C.: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
    • Florêncio, D., Herley, C.: KLASSP: Entering Passwords on a Spyware Infected Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
  • 17
    • 0003317098 scopus 로고    scopus 로고
    • How to make personalized web browsing simple, secure and anonymous
    • Gaber, E., Gibbons, P., Matyas, Y., Mayer, A.: How to make personalized web browsing simple, secure and anonymous. In: Proc. Finan. Crypto 1997 (1997)
    • (1997) Proc. Finan. Crypto
    • Gaber, E.1    Gibbons, P.2    Matyas, Y.3    Mayer, A.4
  • 20
    • 84856038557 scopus 로고    scopus 로고
    • Phishing as a Tragedy of the Commons
    • Lake Tahoe, CA
    • Herley, C., Florêncio, D.: Phishing as a Tragedy of the Commons. In: NSPW 2008, Lake Tahoe, CA (2008)
    • (2008) NSPW
    • Herley, C.1    Florêncio, D.2
  • 21
    • 56649106747 scopus 로고    scopus 로고
    • Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K., Venkasubramanian, N.: Delegate: A Proxy based Architecture fort Secure Website Access from an Untrusted Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, 4186. Springer, Heidelberg (2006)
    • Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K., Venkasubramanian, N.: Delegate: A Proxy based Architecture fort Secure Website Access from an Untrusted Machine. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
  • 22
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM (1981)
    • (1981) Communications of the ACM
    • Lamport, L.1
  • 23
    • 0003882874 scopus 로고    scopus 로고
    • Prentice-Hall, Englewood Cliffs
    • Luotonen, A.: Web Proxy Servers. Prentice-Hall, Englewood Cliffs (1998)
    • (1998) Web Proxy Servers
    • Luotonen, A.1
  • 24
    • 38549118817 scopus 로고    scopus 로고
    • Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
    • Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
    • Mannan, M., van Oorschot, P.C.: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886
    • Mannan, M.1    van Oorschot, P.C.2
  • 26
    • 56649113127 scopus 로고    scopus 로고
    • Mao, Z, Herley, C, Robust Reverse Proxy Implementation. MSR.-TR
    • Mao, Z., Herley, C.: Robust Reverse Proxy Implementation. MSR.-TR
  • 31
    • 56649089975 scopus 로고    scopus 로고
    • Spy-resistant keyboard: More secure password entry on public touch screen displays
    • Tan, D., Keryana, P., Czerwinski, M.: Spy-resistant keyboard: more secure password entry on public touch screen displays. In: CHISIG 2005 (2005)
    • (2005) CHISIG
    • Tan, D.1    Keryana, P.2    Czerwinski, M.3
  • 32
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive Authentication Schemes Safe Against Spyware
    • Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware. In: Symp. on Security and Privacy (2006)
    • (2006) Symp. on Security and Privacy
    • Weinshall, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.