Identificador persistente para citar o vincular este elemento:
http://hdl.handle.net/10553/51896
Campo DC | Valor | idioma |
---|---|---|
dc.contributor.author | De La Puente Arrate, Fernando | - |
dc.contributor.author | Sandoval González, Juan Domingo | - |
dc.contributor.author | Hernández Morera, Pablo Vicente | - |
dc.date.accessioned | 2018-11-25T05:10:55Z | - |
dc.date.available | 2018-11-25T05:10:55Z | - |
dc.date.issued | 2003 | - |
dc.identifier.isbn | 0-7803-7882-2 | - |
dc.identifier.other | WoS | - |
dc.identifier.uri | http://hdl.handle.net/10553/51896 | - |
dc.description.abstract | During the last decades we have witnessed an exponential growth of the number of computer viruses. However, the real threat we are now facing is not so much the fact that a virus can make thousands of copies of itself in our computer, but the wide range of things they can do with the data stored or processed in it. One field in which this fact should be considered with special care is electronic banking. These online services are normally accessed from personal computers with low protection. The operating systems used on these computers tend to sacrifice the security on behalf of the commodity of the user. Under such circumstances, it would be rather easy to implement a man-in-the-middle attack in order to intercept the data exchanged with the bank. This way an attacker could end up controlling the money in our bank accounts. In order to illustrate this assertion, we will outline some possible attacks that can break the security of several security systems, from passwords authentication to smart cards. The conclusion that we extract from here is that we can not trust our computers: The data we input on the computer can be stolen, the data exchanged with other computers on the web can also be intercepted and even modified, and the output we get from the computer monitor may not correspond to the data it is about to process and send in our name. Therefore, an trusted device is needed when performing banking operations over the internet. Here we propose a digital signer device that not only provides a tamper proof storage for the digital signature but also provides its own display and keyboard. This system improves the security of smart cards by avoiding its dependence on the computer to interface with the user, making it immune to virus attacks. | - |
dc.language | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | - |
dc.source | 37Th Annual 2003 International Carnahan Conference On Security Technology, Proceedings, p. 43-50, (2003) | - |
dc.subject | 330790 Microelectrónica | - |
dc.subject.other | Online Banking | - |
dc.subject.other | Authentication | - |
dc.subject.other | Data Integrity | - |
dc.subject.other | Digital Signer Device | - |
dc.subject.other | Optical Communication | - |
dc.title | Pocket device for authentication and data integrity on Internet banking applications | - |
dc.type | info:eu-repo/semantics/conferenceObject | - |
dc.type | ConferenceObject | - |
dc.relation.conference | 37th Annual International Carnahan Conference on Security Technology | - |
dc.identifier.doi | 10.1109/CCST.2003.1297533 | - |
dc.identifier.scopus | 2342550636 | - |
dc.identifier.isi | 000221608800007 | - |
dc.contributor.authorscopusid | 7801412743 | - |
dc.contributor.authorscopusid | 7103327940 | - |
dc.contributor.authorscopusid | 7202207043 | - |
dc.description.lastpage | 50 | - |
dc.description.firstpage | 43 | - |
dc.investigacion | Ingeniería y Arquitectura | - |
dc.type2 | Actas de congresos | - |
dc.contributor.daisngid | 5590934 | - |
dc.contributor.daisngid | 29434884 | - |
dc.contributor.daisngid | 31216532 | - |
dc.description.numberofpages | 8 | - |
dc.utils.revision | Sí | - |
dc.contributor.wosstandard | WOS:De La Puente, F | - |
dc.contributor.wosstandard | WOS:Sandoval, JD | - |
dc.contributor.wosstandard | WOS:Hernandez, P | - |
dc.date.coverdate | Diciembre 2003 | - |
dc.identifier.conferenceid | events120405 | - |
dc.identifier.ulpgc | Sí | - |
item.fulltext | Sin texto completo | - |
item.grantfulltext | none | - |
crisitem.author.dept | GIR IUMA: Equipos y Sistemas de Comunicación | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.dept | GIR IUMA: Equipos y Sistemas de Comunicación | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.dept | GIR IUMA: Sistemas de Información y Comunicaciones | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.orcid | 0000-0001-8724-0266 | - |
crisitem.author.orcid | 0000-0002-1711-9572 | - |
crisitem.author.orcid | 0000-0002-0907-4765 | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.fullName | De La Puente Arrate, Fernando | - |
crisitem.author.fullName | Sandoval González, Juan Domingo | - |
crisitem.author.fullName | Hernández Morera, Pablo Vicente | - |
crisitem.event.eventsstartdate | 14-10-2003 | - |
crisitem.event.eventsenddate | 16-10-2003 | - |
Colección: | Actas de congresos |
Citas SCOPUSTM
1
actualizado el 26-ene-2025
Citas de WEB OF SCIENCETM
Citations
1
actualizado el 25-feb-2024
Visitas
107
actualizado el 14-dic-2024
Google ScholarTM
Verifica
Altmetric
Comparte
Exporta metadatos
Los elementos en ULPGC accedaCRIS están protegidos por derechos de autor con todos los derechos reservados, a menos que se indique lo contrario.