Parasitic Authentication To Protect

@inproceedings{Ebringer2000ParasiticAT,
  title={Parasitic Authentication To Protect},
  author={Tim Ebringer and Peter Thorne and Yuliang and Yibin Zheng},
  year={2000}
}
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia’s 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechanisms require users to enter a PIN or password every time they wish to perform a transaction. More… CONTINUE READING

Citations

Publications citing this paper.

The Online Game Secure Transaction Platform Based on Cooperation Model

  • 2010 International Conference on E-Product E-Service and E-Entertainment
  • 2010

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

How to Construct Random Functions

S. Goldwasser Goldreich, S. Micali
  • 1997

The ESPRIT Project Café,

J.-P. Boly
  • Proc. European Symp. Research in Computer Security 94,
  • 1994
VIEW 1 EXCERPT

Why Cryptosystems Fail

  • ACM Conference on Computer and Communications Security
  • 1993
VIEW 1 EXCERPT

Message authentication with one-way hash functions

  • Computer Communication Review
  • 1992
VIEW 1 EXCERPT

Secure Management of SNMP Networks,” Proc

J. Galvin, K. McCloghrie, J. Davin
  • IFIP Integrated Network Management Symp., Elsevier Science Pub., Amsterdam,
  • 1991
VIEW 2 EXCERPTS

The Codebreakers, MacMillan Publishing Co

D. Kahn
  • New York,
  • 1967
VIEW 1 EXCERPT