- Full text PDF available (2)
- This year (0)
- Last 5 years (0)
- Last 10 years (1)
Although current mechanisms protect against offline credential-stealing attacks, effective protection against online channel-breaking attacks requires technologies to defeat man-in-the-middle (MITM) attacks, and practical protection against content-manipulation attacks requires transaction-authentication technologies.
The authors examine whether trusted computing is likely to remedy the relevant security problems in PCs. They argue that although trusted computing has some merits, it neither provides a complete remedy nor is it likely to prevail in the PC mass market.
Die Beobachtung und Darstellung der Lage – nicht nur des Internets – sondern auch weiterer Infrastrukturen (z. 1 Einleitung