-
1
-
-
84871201016
-
An exprimental investigation of the usability of transaction authorization in online bank security systems
-
AlZomai, M., AlFayyadh, B., Jøsang, A., McCullagh, A.: An exprimental investigation of the usability of transaction authorization in online bank security systems. In: Proc. AISC 2008. pp. 65-73 (2008)
-
(2008)
Proc. AISC 2008
, pp. 65-73
-
-
AlZomai, M.1
AlFayyadh, B.2
Jøsang, A.3
McCullagh, A.4
-
3
-
-
84863150357
-
-
AXSionics AG: Personal AXS-token (2009), http://www.axsionics.ch/tce/ frame/main/414.htm
-
(2009)
Personal AXS-token
-
-
-
4
-
-
84863137863
-
-
Bank Austria: mobileTAN information, http://www.bankaustria.at/de/19741. html
-
MobileTAN Information
-
-
-
9
-
-
5644280926
-
SKID
-
Bosselaers, A., Preneel, B. (eds.) RIPE 1992. Springer, Heidelberg
-
Bosselaers, A., Preneel, B.: SKID. In: Bosselaers, A., Preneel, B. (eds.) RIPE 1992. LNCS, vol. 1007, pp. 169-178. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1007
, pp. 169-178
-
-
Bosselaers, A.1
Preneel, B.2
-
10
-
-
84863150358
-
Financial transactional IC card reader (FINREAD)
-
CEN (European Committee for Standardization)
-
CEN (European Committee for Standardization): Financial transactional IC card reader (FINREAD). In: CEN Workshop Agreements (CWA) 14174 (2004)
-
(2004)
CEN Workshop Agreements (CWA)
, pp. 14174
-
-
-
12
-
-
70350416988
-
Optimised to Fail: Card Readers for Online Banking
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Drimer, S., Murdoch, S.J., Anderson, R.: Optimised to Fail: Card Readers for Online Banking. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 184-200. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 184-200
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
15
-
-
84891128357
-
Transaction generators: Root kits for web
-
USENIX
-
Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: Root kits for web. In: Proc. HotSec 2007. pp. 1-4. USENIX (2007)
-
(2007)
Proc. HotSec 2007
, pp. 1-4
-
-
Jackson, C.1
Boneh, D.2
Mitchell, J.3
-
17
-
-
78751535325
-
Breaking e-banking CAPTCHAs
-
Li, S., Shah, S.A.H., Khan, M.A.U., Khayam, S.A., Sadeghi, A.R., Schmitz, R.: Breaking e-banking CAPTCHAs. In: Proc. ACSAC 2010. pp. 171-180 (2010)
-
(2010)
Proc. ACSAC 2010
, pp. 171-180
-
-
Li, S.1
Shah, S.A.H.2
Khan, M.A.U.3
Khayam, S.A.4
Sadeghi, A.R.5
Schmitz, R.6
-
18
-
-
38549118817
-
Using a personal device to strengthen password authentication from an untrusted computer
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
Mannan, M., van Oorschot, P.: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 88-103. Springer, Heidelberg (2007) (Pubitemid 351153046)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886 LNCS
, pp. 88-103
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
19
-
-
84958648410
-
Visual Authentication and Identification
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322-336. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
20
-
-
69549135546
-
Internet banking: Client-side attacks and protection mechanisms
-
Oppliger, R., Rytz, R., Holderegger, T.: Internet banking: Client-side attacks and protection mechanisms. Computer 42(6), 27-33 (2009)
-
(2009)
Computer
, vol.42
, Issue.6
, pp. 27-33
-
-
Oppliger, R.1
Rytz, R.2
Holderegger, T.3
-
22
-
-
72449127918
-
-
Postbank: mTAN now free for all customers (2008), http://www.postbank. com/pbcom-ag-home/pbcom-pr-press/pbcom-pr-press-archives/pbcom-pr-press- archives-2008/pbcom-pr-pm1063-19-05-08.html
-
(2008)
mTAN Now Free for All Customers
-
-
-
23
-
-
84863172512
-
-
Saturday Star
-
Saturday Star: Victim's SIM swop fraud nightmare (2008), http://www.iol.co.za/index.php?art-id=vn20080112083836189C511499
-
(2008)
Victim's SIM Swop Fraud Nightmare
-
-
-
24
-
-
16444376120
-
Two-factor authentication: Too little, too late
-
Schneier, B.: Two-factor authentication: Too little, too late. Comm. ACM 48(4), 136 (2005)
-
(2005)
Comm. ACM
, vol.48
, Issue.4
, pp. 136
-
-
Schneier, B.1
-
25
-
-
70349653942
-
QR-TAN: Secure mobile transaction authentication
-
IEEE
-
Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: Proc. ARES 2009, pp. 578-583. IEEE (2009)
-
(2009)
Proc. ARES 2009
, pp. 578-583
-
-
Starnberger, G.1
Froihofer, L.2
Goeschka, K.M.3
-
27
-
-
84863150359
-
-
The Financial Express
-
The Financial Express: Russian phone virus that 'steals money' may spread global (2009), http://www.financialexpress.com/news/russian-phone-virus-that- steals-money-may-spread-global/420770
-
(2009)
Russian Phone Virus That 'Steals Money' May Spread Global
-
-
-
28
-
-
63249087404
-
Solutions to the GSM security weaknesses
-
IEEE
-
Toorani, M., Shirazi, A.A.B.: Solutions to the GSM security weaknesses. In: Proc. NGMAST 2008, pp. 576-581. IEEE (2008)
-
(2008)
Proc. NGMAST 2008
, pp. 576-581
-
-
Toorani, M.1
Shirazi, A.A.B.2
-
31
-
-
84863172514
-
-
Volksbank Solling eG: Sm@rt-TAN-plus, http://www.volksbank-solling.de/ flycms/de/html/913/-/Smart+TAN+plus.html
-
Sm@rt-TAN-plus
-
-
-
32
-
-
49249126891
-
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the- Middle and Malicious Software Attacks
-
Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
-
Weigold, T., Kramp, T., Hermann, R., Höring, F., Buhler, P., Baentsch, M.: The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the- Middle and Malicious Software Attacks. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 75-91. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4968
, pp. 75-91
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Höring, F.4
Buhler, P.5
Baentsch, M.6
|