Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the security. This paper describes a new architecture where a security proxy on the client platform communicates with both a trusted security device and the server application. The proxy switches between two TLS channels, one from the client and another from the trusted device. The result is a highly usable and flexible authentication solution with strong security assurance
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications. In ...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
A technology called Trusted Computing (TC), helps building trust relationships between devices. Deve...
Most secure web sites use the SSL/TLS protocol for server authentication. SSL/TLS supports mutual au...
Normally, secure communication between client-server applications is established using secure channe...
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing...
Normally, secure communication between client-server applications is established using secure channe...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Part 3: Lightweight AuthenticationInternational audienceMost SSL/TLS-based electronic commerce (e-co...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years...
In the business world, data is generally the most important asset of a company that must be protecte...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
This Master's project investigates how to strengthen the server authentication for end users using a...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications. In ...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
A technology called Trusted Computing (TC), helps building trust relationships between devices. Deve...
Most secure web sites use the SSL/TLS protocol for server authentication. SSL/TLS supports mutual au...
Normally, secure communication between client-server applications is established using secure channe...
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing...
Normally, secure communication between client-server applications is established using secure channe...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Part 3: Lightweight AuthenticationInternational audienceMost SSL/TLS-based electronic commerce (e-co...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years...
In the business world, data is generally the most important asset of a company that must be protecte...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
This Master's project investigates how to strengthen the server authentication for end users using a...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications. In ...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
A technology called Trusted Computing (TC), helps building trust relationships between devices. Deve...