Abstract
Due to the fast progress of the Internet, and with the increasing numbers of public terminals spread everywhere, people can access personal sensitive data or perform transactions easily through these public terminals. Identifying these public terminals is therefore a most urgent topic. We propose an efficient and secure scheme that meets real environmental conditions for authenticating these public terminals before conducting a transaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating public terminates. Computer Networks 31, 861–970 (1999)
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of a family of attack resistant authentications. IEEE Journal on Selected Areas in Communications 11(5), 679–693 (1993)
Burris, M.W., Pietrzyk, M.C.: Interactive Transportation Information Stations, Center for Urban Transportation Research, College of Engineering, University of South Florida (1997), http://citeseer.nj.nec.com/278953.html
Cheng, C.Y., Seman, K., Yunus, J.: Authentication public terminals with smart cards. In: Proc. TENCON 2000, pp. I-527–I-529 (2000)
Frier, A.O., Kariton, P., Kocher, P.C.: The SSL Protocol: Version 3.0, Technical Report, Internet Draft (1996)
Hochnerg, J., Smith, S.W., Murphy, M., Pedersen, P., Yantis, B.: Kiosk Security Handbook. Los Alamos Unclassified Release LA-UR-95-1657, Los Alamos National Laboratory (1995)
Jan, J.-K., Chen, Y.-Y., Chen, C.-L.: A Realistic Secure Anonymous E-Voting Protocol Based on the ElGamal Scheme. In: Proceedings of the International Conference on Communications & Broadband Networking, Bangalore, INDIA, Sect III 1-9 (2003)
Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (V5), Internet Request for Comment RFC 1510 (1993)
Laufmann, S.C.: Toward Agent-Based Software Engineering for Information-Dependent Enterprise Applications. In: IEE Proceedings of Software Engineering (1997), http://citeseer.ist.psu.edu/laufmann96toward.html
NIST FIP PUB 180, Secure hash standard, National Institute of Standards and Technology, US department of Commerce, DRAFT (1993)
Rivest, R.L.: The MD5 message –digest algorithm, RFC 1231, Internet Activities Board, Internet Privacy Task Force (1992)
Ross, S., Hill, J., Mike, Y.C., Joseph, A.D., Culler, D.E., Brewer, E.A.: A Security Architecture for the Post-PC World, http://citeseer.ist.psu.edu/302477.html
Smith, S.: IBM Research Paul Pedersen, Los Alamos National Laborator, Organizing Electronic Services into Security Taxonomies. In: Proc. of the Second USENIX workshop on Electronic Commerce (1996), http://citeseer.ist.psu.edu/338966.html
Chen, Y.-Y., Jan, J.-K., Chen, C.-L.: The Design of a Securely Anonymous Internet Voting System. Computers & Security 23(4), 330–337 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, CL., Chen, YY., Jan, JK. (2007). A Secure Authentication Scheme for a Public Terminal Before a Transaction. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-74573-0_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74572-3
Online ISBN: 978-3-540-74573-0
eBook Packages: Computer ScienceComputer Science (R0)