메뉴 건너뛰기




Volumn 7035 LNCS, Issue , 2012, Pages 235-249

hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; COMPLICATED SYSTEMS; CRYPTOGRAPHIC HASH FUNCTIONS; E-BANKING; FULL CONTROL; HARDWARE TOKENS; HUMAN BEHAVIORS; HUMAN USERS; KEYLOGGERS; OPEN FRAMEWORKS; PROTOTYPE IMPLEMENTATIONS; SECURITY HOLES; SECURITY PROTOCOLS; SECURITY WEAKNESS; TROJAN HORSE; TRUSTED CENTERS; WHOLE PROCESS;

EID: 84863169434     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27576-0_19     Document Type: Conference Paper
Times cited : (14)

References (32)
  • 1
    • 84871201016 scopus 로고    scopus 로고
    • An exprimental investigation of the usability of transaction authorization in online bank security systems
    • AlZomai, M., AlFayyadh, B., Jøsang, A., McCullagh, A.: An exprimental investigation of the usability of transaction authorization in online bank security systems. In: Proc. AISC 2008. pp. 65-73 (2008)
    • (2008) Proc. AISC 2008 , pp. 65-73
    • AlZomai, M.1    AlFayyadh, B.2    Jøsang, A.3    McCullagh, A.4
  • 3
    • 84863150357 scopus 로고    scopus 로고
    • AXSionics AG: Personal AXS-token (2009), http://www.axsionics.ch/tce/ frame/main/414.htm
    • (2009) Personal AXS-token
  • 4
    • 84863137863 scopus 로고    scopus 로고
    • Bank Austria: mobileTAN information, http://www.bankaustria.at/de/19741. html
    • MobileTAN Information
  • 9
    • 5644280926 scopus 로고
    • SKID
    • Bosselaers, A., Preneel, B. (eds.) RIPE 1992. Springer, Heidelberg
    • Bosselaers, A., Preneel, B.: SKID. In: Bosselaers, A., Preneel, B. (eds.) RIPE 1992. LNCS, vol. 1007, pp. 169-178. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1007 , pp. 169-178
    • Bosselaers, A.1    Preneel, B.2
  • 10
    • 84863150358 scopus 로고    scopus 로고
    • Financial transactional IC card reader (FINREAD)
    • CEN (European Committee for Standardization)
    • CEN (European Committee for Standardization): Financial transactional IC card reader (FINREAD). In: CEN Workshop Agreements (CWA) 14174 (2004)
    • (2004) CEN Workshop Agreements (CWA) , pp. 14174
  • 12
    • 70350416988 scopus 로고    scopus 로고
    • Optimised to Fail: Card Readers for Online Banking
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Drimer, S., Murdoch, S.J., Anderson, R.: Optimised to Fail: Card Readers for Online Banking. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 184-200. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 184-200
    • Drimer, S.1    Murdoch, S.J.2    Anderson, R.3
  • 15
    • 84891128357 scopus 로고    scopus 로고
    • Transaction generators: Root kits for web
    • USENIX
    • Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: Root kits for web. In: Proc. HotSec 2007. pp. 1-4. USENIX (2007)
    • (2007) Proc. HotSec 2007 , pp. 1-4
    • Jackson, C.1    Boneh, D.2    Mitchell, J.3
  • 19
    • 84958648410 scopus 로고    scopus 로고
    • Visual Authentication and Identification
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322-336. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 322-336
    • Naor, M.1    Pinkas, B.2
  • 20
    • 69549135546 scopus 로고    scopus 로고
    • Internet banking: Client-side attacks and protection mechanisms
    • Oppliger, R., Rytz, R., Holderegger, T.: Internet banking: Client-side attacks and protection mechanisms. Computer 42(6), 27-33 (2009)
    • (2009) Computer , vol.42 , Issue.6 , pp. 27-33
    • Oppliger, R.1    Rytz, R.2    Holderegger, T.3
  • 22
    • 72449127918 scopus 로고    scopus 로고
    • Postbank: mTAN now free for all customers (2008), http://www.postbank. com/pbcom-ag-home/pbcom-pr-press/pbcom-pr-press-archives/pbcom-pr-press- archives-2008/pbcom-pr-pm1063-19-05-08.html
    • (2008) mTAN Now Free for All Customers
  • 23
    • 84863172512 scopus 로고    scopus 로고
    • Saturday Star
    • Saturday Star: Victim's SIM swop fraud nightmare (2008), http://www.iol.co.za/index.php?art-id=vn20080112083836189C511499
    • (2008) Victim's SIM Swop Fraud Nightmare
  • 24
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • Schneier, B.: Two-factor authentication: Too little, too late. Comm. ACM 48(4), 136 (2005)
    • (2005) Comm. ACM , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1
  • 25
    • 70349653942 scopus 로고    scopus 로고
    • QR-TAN: Secure mobile transaction authentication
    • IEEE
    • Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: Proc. ARES 2009, pp. 578-583. IEEE (2009)
    • (2009) Proc. ARES 2009 , pp. 578-583
    • Starnberger, G.1    Froihofer, L.2    Goeschka, K.M.3
  • 27
    • 84863150359 scopus 로고    scopus 로고
    • The Financial Express
    • The Financial Express: Russian phone virus that 'steals money' may spread global (2009), http://www.financialexpress.com/news/russian-phone-virus-that- steals-money-may-spread-global/420770
    • (2009) Russian Phone Virus That 'Steals Money' May Spread Global
  • 28
    • 63249087404 scopus 로고    scopus 로고
    • Solutions to the GSM security weaknesses
    • IEEE
    • Toorani, M., Shirazi, A.A.B.: Solutions to the GSM security weaknesses. In: Proc. NGMAST 2008, pp. 576-581. IEEE (2008)
    • (2008) Proc. NGMAST 2008 , pp. 576-581
    • Toorani, M.1    Shirazi, A.A.B.2
  • 31
    • 84863172514 scopus 로고    scopus 로고
    • Volksbank Solling eG: Sm@rt-TAN-plus, http://www.volksbank-solling.de/ flycms/de/html/913/-/Smart+TAN+plus.html
    • Sm@rt-TAN-plus
  • 32
    • 49249126891 scopus 로고    scopus 로고
    • The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the- Middle and Malicious Software Attacks
    • Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
    • Weigold, T., Kramp, T., Hermann, R., Höring, F., Buhler, P., Baentsch, M.: The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the- Middle and Malicious Software Attacks. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 75-91. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4968 , pp. 75-91
    • Weigold, T.1    Kramp, T.2    Hermann, R.3    Höring, F.4    Buhler, P.5    Baentsch, M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.