Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
- 1 January 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Using a Personal Device to Strengthen Password Authentication from an Untrusted ComputerLecture Notes in Computer Science, 2007
- Phoolproof Phishing PreventionLecture Notes in Computer Science, 2006
- SubVirt: implementing malware with virtual machinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Seeing-Is-Believing: Using Camera Phones for Human-Verifiable AuthenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Trusted paths for browsersACM Transactions on Information and System Security, 2005
- Message authentication by integrity with public corroborationPublished by Association for Computing Machinery (ACM) ,2005
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and ApplicationsLecture Notes in Computer Science, 2005
- The Untrusted Computer Problem and Camera-Based AuthenticationLecture Notes in Computer Science, 2002
- The S/KEY One-Time Password System1995