메뉴 건너뛰기




Volumn , Issue , 2008, Pages 39-43

TwoKind authentication: Protecting private information in untrustworthy environments

Author keywords

Authenticators; Passwords; Principle of least privilege

Indexed keywords

AUTHENTICATORS; INTERNET APPLICATION; PASSWORDS; PRINCIPLE OF LEAST PRIVILEGE; PRIVATE COMMUNICATION; PRIVATE INFORMATION;

EID: 70349257241     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456403.1456412     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 1
    • 70349257241 scopus 로고    scopus 로고
    • TwoKind authentication: Protecting private information in untrustworthy environments (extended version)
    • Technical Report TR2008-632, Dartmouth College, Aug
    • K. Bailey, A. Kapadia, L. Vongsathorn, and S. W. Smith. TwoKind authentication: Protecting private information in untrustworthy environments (extended version). Technical Report TR2008-632, Dartmouth College, Aug 2008.
    • (2008)
    • Bailey, K.1    Kapadia, A.2    Vongsathorn, L.3    Smith, S.W.4
  • 3
    • 22144453211 scopus 로고    scopus 로고
    • The MyProxy online credential repository: Research articles
    • J. Basney, M. Humphrey, and V. Welch. The MyProxy online credential repository: Research articles. Softw. Pract. Exper., 35(9):801-816, 2005.
    • (2005) Softw. Pract. Exper , vol.35 , Issue.9 , pp. 801-816
    • Basney, J.1    Humphrey, M.2    Welch, V.3
  • 5
    • 70349262805 scopus 로고    scopus 로고
    • eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/hep aec connecting.asp.
    • eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/hep aec connecting.asp.
  • 6
    • 46449133585 scopus 로고    scopus 로고
    • S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Towards trustworthy kiosk computing. Mobile Computing Systems and Applications, 2007. HotMobile 2007. Eighth IEEE Workshop on, pages 41-45, 8-9 March 2007.
    • S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Towards trustworthy kiosk computing. Mobile Computing Systems and Applications, 2007. HotMobile 2007. Eighth IEEE Workshop on, pages 41-45, 8-9 March 2007.
  • 8
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, Nov. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 9
    • 84883290046 scopus 로고    scopus 로고
    • J. Marchesini and S. W. Smith. SHEMP: Secure Hardware Enhanced MyProxy. In PST, 2005.
    • J. Marchesini and S. W. Smith. SHEMP: Secure Hardware Enhanced MyProxy. In PST, 2005.
  • 10
    • 17844381888 scopus 로고    scopus 로고
    • Keyjacking: The surprising insecurity of client-side SSL
    • J. Marchesini, S. W. Smith, and M. Zhao. Keyjacking: the surprising insecurity of client-side SSL. Computers and Security, 24(2):109-123, 2005.
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 109-123
    • Marchesini, J.1    Smith, S.W.2    Zhao, M.3
  • 11
    • 70349245823 scopus 로고    scopus 로고
    • RSA SecurID. http://www.rsa.com/node.aspx?id=1156.
  • 12
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 14
    • 33846301080 scopus 로고    scopus 로고
    • PorKI: Making user PKI safe on machines of heterogeneous trustworthiness
    • Los Alamitos, CA, USA
    • S. Sinclair and S. W. Smith. PorKI: Making user PKI safe on machines of heterogeneous trustworthiness. In 21st Annual Computer Security Applications Conference, pages 419-430, Los Alamitos, CA, USA, 2005.
    • (2005) 21st Annual Computer Security Applications Conference , pp. 419-430
    • Sinclair, S.1    Smith, S.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.