Journal article icon

Journal article

Reverse authentication in financial transactions

Abstract:

New families of protocol based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these ``human-interactive security protocols'' or HISPs to connect to it. Thus, when authenticating A to B, A first authe...

Expand abstract

Actions


Authors


With A.W. Roscoe More by this author
C. Bangdao More by this author
Journal:
Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU)
Publication date:
2010
URN:
uuid:22475304-395e-4114-aafa-43d4ecd62353
Local pid:
cs:4043

Terms of use


Metrics



If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP