Authenticating public terminals. Asokan, N, Debar, H., Steiner, M., & Waidner, M. Computer Networks, 31(8):861--870, April, 1999. 00059 bibtex: asokan1999authenticating bibtex[issue_date=April 23, 1999;numpages=10;acmid=324129]
Paper abstract bibtex Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information.
@article{ asokan_authenticating_1999,
title = {Authenticating public terminals},
volume = {31},
issn = {1389-1286},
url = {http://dl.acm.org/citation.cfm?id=324119.324129},
abstract = {Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information.},
number = {8},
journal = {Computer Networks},
author = {Asokan, N and Debar, Hervé and Steiner, Michael and Waidner, Michael},
month = {April},
year = {1999},
note = {00059 bibtex: asokan1999authenticating
bibtex[issue_date=April 23, 1999;numpages=10;acmid=324129]},
keywords = {Internet kiosks, authentication, fake terminal attack, mobility},
pages = {861--870}
}
Downloads: 0
{"_id":{"_str":"5298aa259eb585cc26000995"},"__v":0,"authorIDs":[],"author_short":["Asokan, N","Debar, H.","Steiner, M.","Waidner, M."],"bibbaseid":"asokan-debar-steiner-waidner-authenticatingpublicterminals-1999","bibdata":{"abstract":"Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information.","author":["Asokan, N","Debar, Hervé","Steiner, Michael","Waidner, Michael"],"author_short":["Asokan, N","Debar, H.","Steiner, M.","Waidner, M."],"bibtex":"@article{ asokan_authenticating_1999,\n title = {Authenticating public terminals},\n volume = {31},\n issn = {1389-1286},\n url = {http://dl.acm.org/citation.cfm?id=324119.324129},\n abstract = {Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information.},\n number = {8},\n journal = {Computer Networks},\n author = {Asokan, N and Debar, Hervé and Steiner, Michael and Waidner, Michael},\n month = {April},\n year = {1999},\n note = {00059 bibtex: asokan1999authenticating \nbibtex[issue_date=April 23, 1999;numpages=10;acmid=324129]},\n keywords = {Internet kiosks, authentication, fake terminal attack, mobility},\n pages = {861--870}\n}","bibtype":"article","id":"asokan_authenticating_1999","issn":"1389-1286","journal":"Computer Networks","key":"asokan_authenticating_1999","keywords":"Internet kiosks, authentication, fake terminal attack, mobility","month":"April","note":"00059 bibtex: asokan1999authenticating bibtex[issue_date=April 23, 1999;numpages=10;acmid=324129]","number":"8","pages":"861--870","title":"Authenticating public terminals","type":"article","url":"http://dl.acm.org/citation.cfm?id=324119.324129","volume":"31","year":"1999","bibbaseid":"asokan-debar-steiner-waidner-authenticatingpublicterminals-1999","role":"author","urls":{"Paper":"http://dl.acm.org/citation.cfm?id=324119.324129"},"keyword":["Internet kiosks","authentication","fake terminal attack","mobility"],"downloads":0},"bibtype":"article","biburl":"http://bibbase.org/zotero/ealprr","downloads":0,"keywords":["internet kiosks","authentication","fake terminal attack","mobility"],"search_terms":["authenticating","public","terminals","asokan","debar","steiner","waidner"],"title":"Authenticating public terminals","year":1999,"dataSources":["fcy64Zdm28gydMmuE"]}