Nowadays, plenty of digital services are provided to citizens by means of terminals located in public unguarded places. In order to access the desired service, users, authenticate themselves by providing their credentials through such terminals. This approach opens up to the problem of fraudulent devices that could be installed in place of regular terminals to capture users’ confidential information. Indeed, despite the development of increasingly secure systems aiming at guaranteeing an acceptable security level, users are frequently unable to distinguish between terminals on which security measures are enforced (trusted terminals) and malicious terminals that pretend to be trusted. We deal with this problem by presenting a human-comp...
The recent decades have witnessed dramatic developments in information and communication technologie...
Abstract—Commodity computer systems today do not in-clude a full trusted path capability. Consequent...
The aim of the bachelor's thesis is to solve a relevant problem – how to provide user ability to aut...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact wi...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Abstract Due to the fast progress of the Internet, and with the increasing numbers of public termina...
We present a technique based on Trusted Computing's remote attestation to enable the user of a publi...
Trust is a concept of increasing importance in today’s information systems where information storage...
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM...
The way to achieve secure communication is to have authentication protocol, which is a type of cryp...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Authentication is probably one of the main security processes that almost everybody has at one point...
The recent decades have witnessed dramatic developments in information and communication technologie...
Abstract—Commodity computer systems today do not in-clude a full trusted path capability. Consequent...
The aim of the bachelor's thesis is to solve a relevant problem – how to provide user ability to aut...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact wi...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Abstract Due to the fast progress of the Internet, and with the increasing numbers of public termina...
We present a technique based on Trusted Computing's remote attestation to enable the user of a publi...
Trust is a concept of increasing importance in today’s information systems where information storage...
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM...
The way to achieve secure communication is to have authentication protocol, which is a type of cryp...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Authentication is probably one of the main security processes that almost everybody has at one point...
The recent decades have witnessed dramatic developments in information and communication technologie...
Abstract—Commodity computer systems today do not in-clude a full trusted path capability. Consequent...
The aim of the bachelor's thesis is to solve a relevant problem – how to provide user ability to aut...