Authenticating public terminals

Citation
N. Asokan et al., Authenticating public terminals, COMPUT NET, 31(8), 1999, pp. 861-870
Citations number
18
Categorie Soggetti
Information Tecnology & Communication Systems
Journal title
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING
ISSN journal
13891286 → ACNP
Volume
31
Issue
8
Year of publication
1999
Pages
861 - 870
Database
ISI
SICI code
1389-1286(19990423)31:8<861:APT>2.0.ZU;2-J
Abstract
Automatic teller machines, Internet kiosks etc. are examples of public untr usted terminals which are used to access computer systems. One of the secur ity concerns in such systems is the so called fake terminal attack: the att acker sets up a fake terminal and fools unsuspecting users into revealing s ensitive information, such as PINs or private e-mail, in their attempt to u se these terminals. In this paper, we examine this problem in different scenarios and propose a ppropriate solutions. Our basic approach is to find ways for a user to auth enticate a public terminal before using it to process sensitive information . (C) 1999 Elsevier Science B.V. All rights reserved.