메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-12

Uni-directional trusted path: Transaction confirmation on just one device

Author keywords

security; transaction confirmation; trusted computing; trusted path

Indexed keywords

CAPTCHAS; CODE EXECUTION; DEPLOYED SYSTEMS; INPUT AND OUTPUTS; MALWARES; REMOTE ATTESTATION; SECURITY; SENSITIVE INFORMATIONS; SERVICE PROVIDER; TRANSACTION CONFIRMATION; TRUSTED COMPUTING; TRUSTED PATH;

EID: 80051945078     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2011.5958202     Document Type: Conference Paper
Times cited : (29)

References (52)
  • 3
    • 39149098302 scopus 로고    scopus 로고
    • W3C Working Group, Note23, Nov.
    • W3C Working Group, "Inaccessibility of CAPTCHA," Note 23, Nov. 2005.
    • (2005) Inaccessibility of CAPTCHA
  • 8
    • 70350757761 scopus 로고    scopus 로고
    • Usable security: How to get it
    • B. Lampson, "Usable security: How to get it," Communications of the ACM, vol. 52, no. 11, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.11
    • Lampson, B.1
  • 10
    • 42549137149 scopus 로고    scopus 로고
    • Intel trusted execution technology MLE developer's guide
    • Intel Corporation. Dec.
    • Intel Corporation, "Intel trusted execution technology MLE developer's guide," Intel Corporation, Tech. Rep. Document Number: 315168-006, Dec. 2009.
    • (2009) Intel Corporation, Tech. Rep. Document Number: 315168-006
  • 12
    • 33646680778 scopus 로고    scopus 로고
    • What do they indicate? evaluating security and privacy indicators
    • L. F. Cranor, "What do they indicate? evaluating security and privacy indicators," Interactions, vol. 13, no. 3, 2006.
    • (2006) Interactions , vol.13 , Issue.3
    • Cranor, L.F.1
  • 19
    • 80051951603 scopus 로고    scopus 로고
    • European Multilaterally Secure Computing Base Project, "Turaya," http://www.emscb.org/content/pages/turaya.htm.
  • 22
    • 84869631091 scopus 로고    scopus 로고
    • Solving and creating captchas with free porn
    • Jan.
    • C. Doctorow, "Solving and creating captchas with free porn," Boing Boing, Jan. 2004.
    • (2004) Boing Boing
    • Doctorow, C.1
  • 24
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. P. Jablon, "Strong password-only authenticated key exchange," Computer Communication Review, vol. 26, 1996.
    • (1996) Computer Communication Review , vol.26
    • Jablon, D.P.1
  • 35
    • 80051940560 scopus 로고    scopus 로고
    • FreeWebShop.org, http://www.freewebshop.org.
  • 37
    • 84886006499 scopus 로고    scopus 로고
    • Reversing and exploiting an Apple firmware update
    • K. Chen, "Reversing and exploiting an Apple firmware update," in Black Hat, 2009.
    • (2009) Black Hat
    • Chen, K.1
  • 41
    • 80051916671 scopus 로고    scopus 로고
    • IBM Zurich Research Lab, Press release, Oct.
    • IBM Zurich Research Lab, "Security on a stick," Press release, Oct. 2008.
    • (2008) Security on A Stick
  • 44
  • 50
    • 51849104627 scopus 로고    scopus 로고
    • TrustZone: Integrated hardware and software security
    • T. Alves and D. Felton, "TrustZone: Integrated hardware and software security," Information Quaterly, vol. 3, no. 4, 2004.
    • (2004) Information Quaterly , vol.3 , Issue.4
    • Alves, T.1    Felton, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.