메뉴 건너뛰기




Volumn , Issue , 2009, Pages 578-583

QR-TAN: Secure mobile transaction authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION TECHNIQUES; ELECTRONIC TRANSACTION; FULL CONTROL; MOBILE TRANSACTION; OFFLINE; SECURITY TOKENS;

EID: 70349653942     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.96     Document Type: Conference Paper
Times cited : (51)

References (13)
  • 1
    • 33646417370 scopus 로고    scopus 로고
    • Secure internet banking authentication
    • A. Hiltgen, T. Kramp, and T. Weigold, "Secure internet banking authentication," IEEE Security and Privacy, vol. 4, no. 2, pp. 21-29, 2006.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.2 , pp. 21-29
    • Hiltgen, A.1    Kramp, T.2    Weigold, T.3
  • 3
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-isbelieving: Using camera phones for human-verifiable authentication
    • IEEE Computer Society
    • J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-isbelieving: Using camera phones for human-verifiable authentication," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2005, pp. 110-124.
    • (2005) IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 4
    • 38549118817 scopus 로고    scopus 로고
    • Using a personal device to strengthen password authentication from an untrusted computer
    • Financial Cryptography, S. Dietrich and R. Dhamija, Eds, Springer
    • M. Mannan and P. C. van Oorschot, "Using a personal device to strengthen password authentication from an untrusted computer," in Financial Cryptography, ser. Lecture Notes in Computer Science, S. Dietrich and R. Dhamija, Eds., vol. 4886. Springer, 2007, pp. 88-103.
    • (2007) ser. Lecture Notes in Computer Science , vol.4886 , pp. 88-103
    • Mannan, M.1    van Oorschot, P.C.2
  • 6
    • 21644455714 scopus 로고    scopus 로고
    • Securing a remote terminal application with a mobile trusted device
    • IEEE Computer Society
    • A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters, "Securing a remote terminal application with a mobile trusted device," in ACSAC. IEEE Computer Society, 2004, pp. 438-447.
    • (2004) ACSAC , pp. 438-447
    • Oprea, A.1    Balfanz, D.2    Durfee, G.3    Smetters, D.K.4
  • 7
    • 48649085499 scopus 로고    scopus 로고
    • Secure input for web applications
    • IEEE Computer Society
    • M. Szydlowski, C. Kruegel, and E. Kirda, "Secure input for web applications," in ACSAC. IEEE Computer Society, 2007, pp. 375-384.
    • (2007) ACSAC , pp. 375-384
    • Szydlowski, M.1    Kruegel, C.2    Kirda, E.3
  • 8
    • 35248861711 scopus 로고    scopus 로고
    • Instant ciphertextonly cryptanalysis of GSM encrypted communication
    • CRYPTO, D. Boneh, Ed, Springer
    • E. Barkan, E. Biham, and N. Keller, "Instant ciphertextonly cryptanalysis of GSM encrypted communication," in CRYPTO, ser. Lecture Notes in Computer Science, D. Boneh, Ed., vol. 2729. Springer, 2003, pp. 600-616.
    • (2003) ser. Lecture Notes in Computer Science , vol.2729 , pp. 600-616
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 12
    • 84874330562 scopus 로고
    • Some constraints and tradeoffs in the design of network communications
    • E. A. Akkoyunlu, K. Ekanandham, and R. V. Huber, "Some constraints and tradeoffs in the design of network communications," in SOSP, 1975, pp. 67-74.
    • (1975) SOSP , pp. 67-74
    • Akkoyunlu, E.A.1    Ekanandham, K.2    Huber, R.V.3
  • 13
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • B. Schneier, "Two-factor authentication: too little, too late," Commun. ACM, vol. 48, no. 4, p. 136, 2005.
    • (2005) Commun. ACM , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.