An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the terminal's integrity is guaranteed. Satisfying such requirements prevents man-in-the-middle attacks and eavesdropping. We have analysed several existing transaction schemes and concluded that they tend not to meet all requirements during the entire transaction. We propose a new, generic protocol that provides (a) optional terminal identification, (b) key establishment, and (c) customisable integrity assurance. © 2012 IFIP International Federation for Information Processing
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact wi...
Abstract — Self-signed certificates for SSL and self-generated hosts keys for SSH are popular zero-c...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Abstract Due to the fast progress of the Internet, and with the increasing numbers of public termina...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
Trust is a concept of increasing importance in today’s information systems where information storage...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Establishing trust relationships between network participants by having them prove their operating s...
Internet addresses are routinely being used to infer the identity of persons who send offending traf...
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) netwo...
—The Transport Layer ensures that data is sent transparently between end-users while also enabling ...
International audienceThe ATM Forum international consortium recently approved the first version of ...
[[abstract]]A secure authentication protocol which supports both the privacy of messages and the aut...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact wi...
Abstract — Self-signed certificates for SSL and self-generated hosts keys for SSH are popular zero-c...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Abstract Due to the fast progress of the Internet, and with the increasing numbers of public termina...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
Trust is a concept of increasing importance in today’s information systems where information storage...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Establishing trust relationships between network participants by having them prove their operating s...
Internet addresses are routinely being used to infer the identity of persons who send offending traf...
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) netwo...
—The Transport Layer ensures that data is sent transparently between end-users while also enabling ...
International audienceThe ATM Forum international consortium recently approved the first version of ...
[[abstract]]A secure authentication protocol which supports both the privacy of messages and the aut...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact wi...
Abstract — Self-signed certificates for SSL and self-generated hosts keys for SSH are popular zero-c...
With the advancement in Internet-based technologies, network applications are no longer just limited...