Authenticating public terminals
نویسندگان
چکیده
Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information. q 1999 Elsevier Science B.V. All rights reserved.
منابع مشابه
A Secure Authentication Scheme for a Public Terminal Before a Transaction
Due to the fast progress of the Internet, and with the increasing numbers of public terminals spread everywhere, people can access personal sensitive data or perform transactions easily through these public terminals. Identifying these public terminals is therefore a most urgent topic. We propose an efficient and secure scheme that meets real environmental conditions for authenticating these pu...
متن کاملUsing a Variation of Elgamal Signature to Support Fast and Lazy Authenticating Origin Autonomous Systems
About the schemes for authenticating origin autonomous systems, related documents think it is appropriate to authenticate address attestations and related public keys only using the information of update messages. However, this approach is infeasible in existing schemes because update messages are limited in length to 4096 bytes and thus are too small to carry the necessary public key certifica...
متن کاملFlexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility lies in the fact that with only one piece of authenticating data (e.g., digital signature or message authentication code) spanning all blocks, each block can be independently authenticated while ignoring the other blo...
متن کاملAuthenticating ‘Cover to Cover’ Reader Series vis-à-vis Cultural Norms for the Iranian community
This research study was an attempt to explore hidden cultural components in an ELT textbook from Oxford University Press (OUP) titled 'Cover to Cover'. Two research methodologies were relied on to unveil the western ideologies in this series: Firstly, a qualitative review over its reading textbooks was undertaken for authenticating the hidden western values for Iranian contexts. At this stage, ...
متن کاملCompression Tolerant Image Authentication
It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. In this paper we propose a scheme for authenticating the visual content of digital images. This scheme is robust to com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 31 شماره
صفحات -
تاریخ انتشار 1999