文件名称:6
介绍说明--下载内容均来自于网络,请自行研究使用
The use of computers in public places i ncreasingly common
in everyday life. In using one of these computers, a user is trusting
it to correctly carry out her orders. For many transactions, particularly
banking operations, blind trust in a public terminal will not satisfy most
users. In this paper the aim is therefore to provide the user with authenticated
communication between herself and a remote trusted computer,
via the untrusted computer.-The use of computers in public places is increasingly common
in everyday life. In using one of these computers, a user is trusting
it to correctly carry out her orders. For many transactions, particularly
banking operations, blind trust in a public terminal will not satisfy most
users. In this paper the aim is therefore to provide the user with authenticated
communication between herself and a remote trusted computer,
via the untrusted computer.
in everyday life. In using one of these computers, a user is trusting
it to correctly carry out her orders. For many transactions, particularly
banking operations, blind trust in a public terminal will not satisfy most
users. In this paper the aim is therefore to provide the user with authenticated
communication between herself and a remote trusted computer,
via the untrusted computer.-The use of computers in public places is increasingly common
in everyday life. In using one of these computers, a user is trusting
it to correctly carry out her orders. For many transactions, particularly
banking operations, blind trust in a public terminal will not satisfy most
users. In this paper the aim is therefore to provide the user with authenticated
communication between herself and a remote trusted computer,
via the untrusted computer.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
(good)ClarkeGassendKotwalBurnsideVanDijkDevadasRivest-TheUntrustedComputerProblemAndCameraBasedAuthentication.pdf