메뉴 건너뛰기




Volumn 31, Issue 18, 2008, Pages 4367-4375

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing

Author keywords

ATM machines; On line services; Password; Security; User ID

Indexed keywords

ASYNCHRONOUS TRANSFER MODE; AUTOMATIC TELLER MACHINES; COMPUTER CRIME; INTERNET PROTOCOLS; PROBABILITY DENSITY FUNCTION; VIRTUAL REALITY;

EID: 56949095051     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.05.005     Document Type: Article
Times cited : (34)

References (34)
  • 1
    • 56949100210 scopus 로고    scopus 로고
    • T. Dierks, C. Allen. The TLS Protocol - Version 1.0, IETF RFC 2246, January, 1999.
    • T. Dierks, C. Allen. The TLS Protocol - Version 1.0, IETF RFC 2246, January, 1999.
  • 2
    • 56949084144 scopus 로고    scopus 로고
    • Anti-phishing working group. Available from: .
    • Anti-phishing working group. Available from: .
  • 3
    • 56949098587 scopus 로고    scopus 로고
    • Available from: .
    • Available from: .
  • 4
    • 56949089813 scopus 로고    scopus 로고
    • B. Ross, C. Jackson, N. Miyake, D. Boneh, J. Mitchell, Stronger password authentication using browser extensions, in: Proceedings of 14th USENIX Security Symposium.
    • B. Ross, C. Jackson, N. Miyake, D. Boneh, J. Mitchell, Stronger password authentication using browser extensions, in: Proceedings of 14th USENIX Security Symposium.
  • 5
    • 56949088792 scopus 로고    scopus 로고
    • E. Gaber, P. Gobbons, Y. Mattias, A. Mayer, How to make personalized web browsing simple, secure, and anonymous, in: Proceedings of Financial Crypto'97, LNCS, vol. 1318, Springer-Verlag, 1997.
    • E. Gaber, P. Gobbons, Y. Mattias, A. Mayer, How to make personalized web browsing simple, secure, and anonymous, in: Proceedings of Financial Crypto'97, LNCS, vol. 1318, Springer-Verlag, 1997.
  • 7
    • 56949107441 scopus 로고    scopus 로고
    • E. Jung, Passwordmaker. Available from: .
    • E. Jung, Passwordmaker. Available from: .
  • 8
    • 56949086514 scopus 로고    scopus 로고
    • J. la Poutr′e, Password composer. Available from: .
    • J. la Poutr′e, Password composer. Available from: .
  • 9
    • 56949094868 scopus 로고    scopus 로고
    • J.R. Levine, A flexible method to validate SMTP senders in DNS, April 2004. Available from: .
    • J.R. Levine, A flexible method to validate SMTP senders in DNS, April 2004. Available from: .
  • 10
    • 56949094073 scopus 로고    scopus 로고
    • V.A. Brennen, Cryptography Dictionary, vol. 2005, 1.0.0 ed., 2004.
    • V.A. Brennen, Cryptography Dictionary, vol. 2005, 1.0.0 ed., 2004.
  • 11
    • 56949087560 scopus 로고    scopus 로고
    • Available from: .
    • Available from: .
  • 12
    • 84941147384 scopus 로고    scopus 로고
    • E. Damiani et al., Spam attacks: P2P to the rescue, in: Proceedings of Thirteenth International World Wide Web Conference, 2004, pp. 358-359.
    • E. Damiani et al., Spam attacks: P2P to the rescue, in: Proceedings of Thirteenth International World Wide Web Conference, 2004, pp. 358-359.
  • 13
    • 44649109729 scopus 로고    scopus 로고
    • System and method for generating unique passwords
    • Abadi M., Bharat L., and Marais A. System and method for generating unique passwords. US Patent 6 141 (1997) 760
    • (1997) US Patent , vol.6 , Issue.141 , pp. 760
    • Abadi, M.1    Bharat, L.2    Marais, A.3
  • 14
    • 56949086755 scopus 로고    scopus 로고
    • M. Kuhn, Probability theory for pickpockets - ec-PIN guessing, Available from: , 1997.
    • M. Kuhn, Probability theory for pickpockets - ec-PIN guessing, Available from: , 1997.
  • 15
    • 56949108236 scopus 로고    scopus 로고
    • C. Herley, D. Florencio, How To login from an Internet Café without worrying about Keyloggers, in: Proceedings of Symposium on Usable Privacy and Security (SOUPS)'06.
    • C. Herley, D. Florencio, How To login from an Internet Café without worrying about Keyloggers, in: Proceedings of Symposium on Usable Privacy and Security (SOUPS)'06.
  • 16
    • 56949091663 scopus 로고    scopus 로고
    • Available from: .
    • Available from: .
  • 17
    • 56949092195 scopus 로고    scopus 로고
    • Available from: .
    • Available from: .
  • 18
    • 56949105110 scopus 로고    scopus 로고
    • B. MÖLLER, Schwächen des ec-PIN-Verfahrens. Available from: , February, 1997, Manuscript.
    • B. MÖLLER, Schwächen des ec-PIN-Verfahrens. Available from: , February, 1997, Manuscript.
  • 19
    • 56949101601 scopus 로고    scopus 로고
    • A. Herzberg, A. Gbara, Trustbar: protecting (even naive) web users from spoofing and phishing attacks, Cryptology ePrint Archive, Report 2004/155, 2004. Available from: .
    • A. Herzberg, A. Gbara, Trustbar: protecting (even naive) web users from spoofing and phishing attacks, Cryptology ePrint Archive, Report 2004/155, 2004. Available from: .
  • 20
    • 56949091279 scopus 로고    scopus 로고
    • S. Wiedenbeck, J. Waters, L. Sobrado, J. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, in: Proceedings of the working conference on Advanced visual interfaces,Venezia, Italy.
    • S. Wiedenbeck, J. Waters, L. Sobrado, J. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, in: Proceedings of the working conference on Advanced visual interfaces,Venezia, Italy.
  • 21
    • 14844314151 scopus 로고    scopus 로고
    • V. Roth, K. Richter, R. Freidinger, A PIN-entry method resilient against shoulder-surfing, in: Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004, pp. 236-245.
    • V. Roth, K. Richter, R. Freidinger, A PIN-entry method resilient against shoulder-surfing, in: Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004, pp. 236-245.
  • 22
    • 56949099671 scopus 로고    scopus 로고
    • IETF, MTA Authorization Records in DNS (MARID), June, 2004. Available form: .
    • IETF, MTA Authorization Records in DNS (MARID), June, 2004. Available form: .
  • 23
    • 56949083051 scopus 로고    scopus 로고
    • G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, in: Proceedings of the 12th Annual Network and Distributed System Security Symposium, 2005.
    • G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, in: Proceedings of the 12th Annual Network and Distributed System Security Symposium, 2005.
  • 24
    • 56949086891 scopus 로고    scopus 로고
    • G.T. Wilfong, Method and apparatus for secure PIN entry, US Patent #5,940,511, United States Patent and Trademark Office, Assignee, Lucent Technologies, Inc., Murray Hill, NJ, May, 1997.
    • G.T. Wilfong, Method and apparatus for secure PIN entry, US Patent #5,940,511, United States Patent and Trademark Office, Assignee, Lucent Technologies, Inc., Murray Hill, NJ, May, 1997.
  • 25
    • 56949103737 scopus 로고    scopus 로고
    • J. Mason, Filtering spam with SpamAssassin, in: Proceedings of HEANet Annual Conference, 2002.
    • J. Mason, Filtering spam with SpamAssassin, in: Proceedings of HEANet Annual Conference, 2002.
  • 27
    • 56949084833 scopus 로고    scopus 로고
    • M. Sahami, S. Dumais, D. Heckerman, E.Horvitz, A Bayesian approach to filtering junk E-Mail. in: Learning for Text Categorization, The 1998 Workshop, May, 1998.
    • M. Sahami, S. Dumais, D. Heckerman, E.Horvitz, A Bayesian approach to filtering junk E-Mail. in: Learning for Text Categorization, The 1998 Workshop, May, 1998.
  • 28
    • 56949088348 scopus 로고    scopus 로고
    • T.A. Meyer, B. Whateley, SpamBayes: effective open-source, Bayesian based, email classification system, in: Proceedings of the CEAS, 2004.
    • T.A. Meyer, B. Whateley, SpamBayes: effective open-source, Bayesian based, email classification system, in: Proceedings of the CEAS, 2004.
  • 29
    • 56949086252 scopus 로고    scopus 로고
    • MAPS, RBL - Realtime Blackhole List, 1996. Available from: .
    • MAPS, RBL - Realtime Blackhole List, 1996. Available from: .
  • 30
    • 56949097551 scopus 로고    scopus 로고
    • The Spamhaus Project, The Spamhaus Block List. Available from: .
    • The Spamhaus Project, The Spamhaus Block List. Available from: .
  • 31
    • 56949102176 scopus 로고    scopus 로고
    • Netcraft, Anti-Phishing Toolbar. Available from: .
    • Netcraft, Anti-Phishing Toolbar. Available from: .
  • 33
    • 33746734206 scopus 로고    scopus 로고
    • A lightweight secure protocol for wireless sensor networks
    • Sun B., Li C.-C., Wu K., and Xiao Y. A lightweight secure protocol for wireless sensor networks. Computer Communications 29 13-14 (2006) 2556-2568
    • (2006) Computer Communications , vol.29 , Issue.13-14 , pp. 2556-2568
    • Sun, B.1    Li, C.-C.2    Wu, K.3    Xiao, Y.4
  • 34
    • 56949085955 scopus 로고    scopus 로고
    • B. Sun, Y. Xiao, C.-C. Li, H.-H. Chen, T.A. Yang, Security co-existence of wireless sensor networks and RFID for pervasive computing, Computer Communications, Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing.
    • B. Sun, Y. Xiao, C.-C. Li, H.-H. Chen, T.A. Yang, Security co-existence of wireless sensor networks and RFID for pervasive computing, Computer Communications, Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.