메뉴 건너뛰기




Volumn , Issue , 2009, Pages 115-124

Authenticating ubiquitous services: A study of wireless hotspot access

Author keywords

Authentication; Phishing; Ubiquitous services; Wi Fi

Indexed keywords

HOT SPOT; PHISHING; PHISHING ATTACKS; UBIQUITOUS COMPUTING ENVIRONMENT; UBIQUITOUS ENVIRONMENTS; UBIQUITOUS SERVICE; UBIQUITOUS SERVICES; WIFI HOTSPOTS;

EID: 70450181109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1620545.1620565     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 5
    • 0038789791 scopus 로고    scopus 로고
    • Persuasive technology: Using computers to change what we think and do
    • Fogg, B. J. Persuasive Technology: Using computers to change what we think and do. San Francisco: Morgan Kaufman. (2002).
    • (2002) San Francisco: Morgan Kaufman
    • Fogg, B.J.1
  • 6
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, J. and Nyberg, K. Manual authentication for wireless devices. RSA Cryptobytes 7(1), (2004), 29-37.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, J.2    Nyberg, K.3
  • 7
    • 0010602271 scopus 로고    scopus 로고
    • System software for ubiquitous computing
    • Kindberg, T., and Fox, A. System software for ubiquitous computing. In IEEE Pervasive Computing 1(1), (2002), 70-81.
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.1 , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 10
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-isbelieving: Using camera phones for human-verifiable authentication
    • McCune, J.M., Perrig, A., and Reiter, M.K. Seeing-isbelieving: using camera phones for human-verifiable authentication. In IEEE Security and Privacy, (2005), 110-124.
    • (2005) IEEE Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 11
    • 84899281571 scopus 로고    scopus 로고
    • Trust builders and trustbusters: The role of trust cues in interfaces to ecommerce applications
    • Kluwer, London
    • Riegelsberger, J. and Sasse, M.A. Trust builders and trustbusters: the role of trust cues in interfaces to ecommerce applications. In Proc. E-Commerce, E-Society, and E-Government 2001. Kluwer, London (2001), 17-30.
    • (2001) Proc. E-Commerce, E-Society, and E-Government 2001 , pp. 17-30
    • Riegelsberger, J.1    Sasse, M.A.2
  • 16
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Vaudenay, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology - CRYPTO 2005, (2005), 309-326.
    • (2005) Proc. Advances in Cryptology - CRYPTO 2005 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.