Identificador persistente para citar o vincular este elemento: http://hdl.handle.net/10553/51895
Campo DC Valoridioma
dc.contributor.authorDe La Puente Arrate, Fernandoen_US
dc.contributor.authorSandoval, J. D.en_US
dc.contributor.authorHernández, P.en_US
dc.contributor.authorMolina, C. J.en_US
dc.date.accessioned2018-11-25T05:10:18Z-
dc.date.available2018-11-25T05:10:18Z-
dc.date.issued2005en_US
dc.identifier.isbn0-7803-9245-0en_US
dc.identifier.issn1071-6572en_US
dc.identifier.otherWoS-
dc.identifier.urihttp://hdl.handle.net/10553/51895-
dc.description.abstractEven though it probably has never happened to us, it is possible to introduce our credit card on an ATM and have it steal the money from our account or access our bank account from a computer and have someone else getting access to it. In the first case we believe that the ATM is a trusted device and will never try to cheat us. In the second case, we believe that our computer provides a safe environment for electronic banking. Although there are a few records in history of ATM fraud, we generally believe that it won't happen to us. However, we all know that computers are not safe and still take the risk. Viruses and trojans (malicious software) can do all this and much more, not only in movies but in the real world. This is possible just because we are giving away all the information needed to access our money instead of keeping them. In the first case we are giving away Our credit card and the PIN (Personal Identification Number) and in the second case we are giving away our login and password/s. Anyone who can intercept this information can successfully pretend to be us and withdraw our money. Digital signature can solve these problems providing the means for validating a user or a given operation without. exposing the data required to do it.. However, the point is not if digital signature is the best way to protect our money, but how to implement the system in a way that is easy to use and safe enough.Here we will propose some possible implementations based on die idea that not only digital Signature is needed but also human interaction is required in order to avoid a classic man-in-the-middle-attack. It is not safe to introduce a smart card on a standard smart card reader, introduce the PIN on the application used to access it, and then expect the application to do exactly what we tell it to do. That would be perfectly fine in a world where we can trust. each Other and we can consider computers to be completely safe from intrusions. But the truth is unfortunately far from being like that and so we need to look for new ways to protect us from this kind of attacks.Several hardware devices will be Proposed based on a basic structure where we have a display, some Way to input data (such as a keyboard or a few buttons) and some way to communicate with any computer.en_US
dc.languageengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.ispartofProceedings - International Carnahan Conference on Security Technologyen_US
dc.source39Th Annual 2005 International Carnahan Conference On Security Technology, Proceedings [ISSN 0737-1160], p. 174-177, 2005en_US
dc.subject33 Ciencias tecnológicasen_US
dc.titleImproving online banking security with hardware devicesen_US
dc.typeinfo:eu-repo/semantics/conferenceObjecten_US
dc.typeConferenceObjecten_US
dc.relation.conference39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05en_US
dc.identifier.doi10.1109/CCST.2005.1594874en_US
dc.identifier.scopus42749108977-
dc.identifier.isi000236384200037-
dc.contributor.authorscopusid55349233000-
dc.contributor.authorscopusid7103327940-
dc.contributor.authorscopusid7202207043-
dc.contributor.authorscopusid57206134697-
dc.contributor.authorscopusid57203153379-
dc.description.lastpage177en_US
dc.identifier.issue1594874-
dc.description.firstpage174en_US
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Actas de congresosen_US
dc.contributor.daisngid10495065-
dc.contributor.daisngid29434884-
dc.contributor.daisngid9976844-
dc.contributor.daisngid4147940-
dc.description.numberofpages4en_US
dc.utils.revisionen_US
dc.contributor.wosstandardWOS:Puente, F-
dc.contributor.wosstandardWOS:Sandoval, JD-
dc.contributor.wosstandardWOS:Hernandez, P-
dc.contributor.wosstandardWOS:Molina, CJ-
dc.date.coverdateDiciembre 2005en_US
dc.identifier.conferenceidevents121333-
dc.identifier.ulpgcen_US
item.fulltextSin texto completo-
item.grantfulltextnone-
crisitem.event.eventsstartdate11-10-2005-
crisitem.event.eventsenddate14-10-2005-
crisitem.author.deptGIR IUMA: Equipos y Sistemas de Comunicación-
crisitem.author.deptIU de Microelectrónica Aplicada-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.deptGIR IUMA: Equipos y Sistemas de Comunicación-
crisitem.author.deptIU de Microelectrónica Aplicada-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.deptGIR IUMA: Sistemas de Información y Comunicaciones-
crisitem.author.deptIU de Microelectrónica Aplicada-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.orcid0000-0001-8724-0266-
crisitem.author.orcid0000-0002-1711-9572-
crisitem.author.orcid0000-0002-0907-4765-
crisitem.author.parentorgIU de Microelectrónica Aplicada-
crisitem.author.parentorgIU de Microelectrónica Aplicada-
crisitem.author.parentorgIU de Microelectrónica Aplicada-
crisitem.author.fullNameDe La Puente Arrate, Fernando-
crisitem.author.fullNameSandoval González, Juan Domingo-
crisitem.author.fullNameHernández Morera, Pablo Vicente-
Colección:Actas de congresos
Vista resumida

Google ScholarTM

Verifica

Altmetric


Comparte



Exporta metadatos



Los elementos en ULPGC accedaCRIS están protegidos por derechos de autor con todos los derechos reservados, a menos que se indique lo contrario.