Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
暂无分享,去创建一个
[1] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[2] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[3] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[4] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[5] Michael K. Reiter,et al. Bump in the Ether: A Framework for Securing Sensitive User Input , 2006, USENIX Annual Technical Conference, General Track.
[6] Yunheung Paek,et al. Advances in Computer Systems Architecture , 2008 .
[7] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[8] Martín Abadi,et al. Authentication and Delegation with Smart-cards , 1991, TACS.
[9] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[10] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[11] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[12] Sean W. Smith,et al. Trusted paths for browsers , 2002, TSEC.
[13] Srinivas Devadas,et al. The untrusted computer problem and camera based authentication using optical character recognition , 2002 .
[14] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[15] Nalini Venkatasubramanian,et al. Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[16] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[17] Jason Milletary,et al. Technical Trends in Phishing Attacks , 1969 .
[18] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[19] Edward W. Felten,et al. Hand-Held Computers Can Be Better Smart Cards , 1999, USENIX Security Symposium.
[20] Alex Biryukov,et al. Cryptanalysis of the Alleged SecurID Hash Function , 2003, Selected Areas in Cryptography.
[21] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[22] Virgil D. Gligor,et al. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes , 2001, FSE.
[23] Daphna Weinshall,et al. Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[24] Robert Biddle,et al. A Usability Study and Critique of Two Password Managers , 2006, USENIX Security Symposium.
[25] Simson L. Garfinkel,et al. Secure Web Authentication with Mobile Phones , 2004 .
[26] Paul C. van Oorschot,et al. Message authentication by integrity with public corroboration , 2005, NSPW '05.
[27] Gernot Heiser. Secure Embedded Systems Need Microkernels , 2005, login Usenix Mag..
[28] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[29] Diana K. Smetters,et al. Securing a remote terminal application with a mobile trusted device , 2004, 20th Annual Computer Security Applications Conference.
[30] Geoffrey G. Xie,et al. Quantifying effect of network latency and clock drift on time-driven key sequencing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[31] Dan Boneh,et al. Spyware Resistant Web Authentication using Virtual Machines , 2006 .
[32] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[33] Volker Roth,et al. A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.
[34] Gernot Heiser,et al. OS Verification - Now! , 2005, HotOS.
[35] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[36] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[37] Initial Cryptanalysis of the RSA SecurID Algorithm , 2001 .