메뉴 건너뛰기




Volumn 58, Issue 1, 2014, Pages

Bringing strong authentication and transaction security to the realm of mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; FREQUENCY SHIFT KEYING; MOBILE DEVICES; PERSONAL COMPUTERS;

EID: 84928556255     PISSN: 00188646     EISSN: 21518556     Source Type: Journal    
DOI: 10.1147/JRD.2013.2287810     Document Type: Article
Times cited : (6)

References (27)
  • 4
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • Apr.
    • N. Leavitt, "Mobile phones: The next frontier for hackers?" Computer, vol. 38, no. 4, pp. 20-23, Apr. 2005.
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 10
    • 49249126891 scopus 로고    scopus 로고
    • The Zurich Trusted Information ChannelVAn efficient defence against man-in-the-middle and malicious software attacks
    • P. Lipp, A.-R. Sadeghi, and K.-M. Koch, Eds, ser. Lecture Notes in Computer Science
    • T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler, and M. Baentsch, "The Zurich Trusted Information ChannelVAn efficient defence against man-in-the-middle and malicious software attacks," in Proc.1st Int. Conf. Trusted Comput. Trust Inf. Technol., Trusted Comput.-Challenges Appl., vol. 4968, P. Lipp, A.-R. Sadeghi, and K.-M. Koch, Eds., 2008, pp. 75-91, ser. Lecture Notes in Computer Science.
    • (2008) Proc.1st Int. Conf. Trusted Comput. Trust Inf. Technol., Trusted Comput.-Challenges Appl. , vol.4968 , pp. 75-91
    • Weigold, T.1    Kramp, T.2    Hermann, R.3    Höring, F.4    Buhler, P.5    Baentsch, M.6
  • 12
    • 84864552184 scopus 로고    scopus 로고
    • Review of browser extensions, a man-in-the browser phishing techniques targeting bank customers
    • Perth, WA, Australia
    • N. Utakrit, "Review of browser extensions, a man-in-the browser phishing techniques targeting bank customers," in Proc. 7th Australian Inf. Security Manag. Conf., Perth, WA, Australia, 2009, pp. 110-119.
    • (2009) Proc. 7th Australian Inf. Security Manag. Conf. , pp. 110-119
    • Utakrit, N.1
  • 13
    • 31344439511 scopus 로고    scopus 로고
    • SSL man-in-the-middle Attacks
    • [Online]. Available
    • P. Burkholder, "SSL man-in-the-middle Attacks," in SANS Inst. Reading Room, 2002. [Online]. Available: http://www.sans.org/reading-room/whitepapers/threats/ssl-man-in-the-middleattacks- 480
    • (2002) SANS Inst. Reading Room
    • Burkholder, P.1
  • 17
    • 84930656920 scopus 로고    scopus 로고
    • [Online]. Available
    • MFi Program, Apple, Inc. [Online]. Available: https://developer. apple.com/programs/mfi/
    • MFi Program, Apple, Inc.,1
  • 19
    • 84875683653 scopus 로고    scopus 로고
    • [Online]. Available
    • BEMC2," in RSA SecurID. [Online]. Available: http://www.emc. com/security/rsa-securid.htm
    • RSA SecurID
    • BEMC21
  • 20
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • Apr.
    • B. Schneier, "Two-factor authentication: Too little, too late," Commun. ACM, vol. 48, no. 4, p. 136, Apr. 2005.
    • (2005) Commun. ACM , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1
  • 21
    • 84930673232 scopus 로고    scopus 로고
    • Enhancing authentication in eBanking with NFC-enabled mobile phones
    • M.S. thesis,., Tech. Univ. Eindhoven, Eindhoven, The Netherlands
    • D. A. Ortiz-Yepes, "Enhancing authentication in eBanking with NFC-enabled mobile phones," M.S. thesis, Dept. Math. Comput. Sci., Tech. Univ. Eindhoven, Eindhoven, The Netherlands, 2008.
    • (2008) Dept. Math. Comput. Sci
    • Ortiz-Yepes, D.A.1
  • 22
    • 84930682973 scopus 로고    scopus 로고
    • [Online]. Available
    • CrontoSign Mobile App, Cronto. [Online]. Available: http://www. cronto.com/crontosign-transaction-authentication-mobile.htm
  • 24
    • 84930641654 scopus 로고    scopus 로고
    • [Online]. Available
    • CrontoSign Device, Cronto. [Online]. Available: http://www. cronto.com/crontosign-transaction-authentication-device.htm
    • CrontoSign Device, Cronto


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.