EFFICIENT AND PRACTICAL APPROACH TO AUTHENTICATING PUBLIC TERMINALS

H.-Y. Chien∗

References

  1. [1] N. Asokan, H. Debar, M. Steiner, & M. Waidner, Authenticat-ing public terminals, Computer Networks, 31, 1999, 861–970.
  2. [2] C.-Y. Cheng, K. Seman, & J. Yunus, Authentication publicterminals with smart cards, Proc. of TENCON 2000, 527–529.
  3. [3] H.Y. Chien, R.C. Wang, & C.C. Yang, Note on robust andsimple authentication protocol, The Computer Journal, 48 (1),2005, 27–29.
  4. [4] A.O. Frier, P. Kariton, & P.C. Kocher, The SSL Protocol:Version 3.0, Technical Report, Internet Draft, 1996.
  5. [5] J.T. Kohl & B.C. Neuman, The Kerberos Network Authenti-cation Service (V5), Internet Request for Comment RFC 1510,1993.
  6. [6] R. Ganesan, Yaksha: Augmenting Kerberos with public keycryptography, Proc. of IEEE Symposium on Network andDistributed System Security, 1995, 132–143.
  7. [7] J.S. Pierce & H. Mahaney, Opportunistic annexing handhelddevices: Opportunities and challenges, Proc. of HCIC 2004,2004.
  8. [8] S.N. Patel, J.S. Pierce, & G.D. Abowd, A gesture-basedauthentication scheme for un-trusted public terminals, Proc. ofthe 17th Annual ACM Symposium on User Interface Softwareand Technology Table of Contents, NM, USA, 2004, 157–160.

Important Links:

Go Back