Using the Smart Card Web Server in Secure Branchless Banking (English)
- New search for: Cobourne, Sheila
- New search for: Mayes, Keith
- New search for: Markantonakis, Konstantinos
- New search for: Cobourne, Sheila
- New search for: Mayes, Keith
- New search for: Markantonakis, Konstantinos
In:
Network and System Security
1
;
250-263
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Using the Smart Card Web Server in Secure Branchless Banking
-
Contributors:
-
Published in:Network and System Security , 1 ; 250-263Lecture Notes in Computer Science ; 7873, 1 ; 250-263
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case StudyRodríguez-Gómez, Rafael A. / Maciá-Fernández, Gabriel / García-Teodoro, Pedro et al. | 2013
- 14
-
A Technology Independent Security Gateway for Real-Time Multimedia CommunicationLi, Fudong / Clarke, Nathan / Furnell, Steven et al. | 2013
- 26
-
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc NetworkRao, Y. Sreenivasa / Dutta, Ratna et al. | 2013
- 40
-
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion DetectionMeng, Yuxin / Li, Wenjuan / Kwok, Lam-for et al. | 2013
- 54
-
Model the Influence of Sybil Nodes in P2P BotnetsWang, Tianzuo / Wang, Huaimin / Liu, Bo / Shi, Peichang et al. | 2013
- 68
-
A Novel Security Protocol for Resolving Addresses in the Location/ID Split ArchitectureAiash, Mahdi et al. | 2013
- 80
-
The OffPAD: Requirements and UsageVarmedal, Kent Are / Klevjer, Henning / Hovlandsvåg, Joakim / Jøsang, Audun / Vincent, Johann / Miralabé, Laurent et al. | 2013
- 94
-
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc NetworksGurung, Sashi / Lin, Dan / Squicciarini, Anna / Bertino, Elisa et al. | 2013
- 109
-
Using Trusted Platform Modules for Location Assurance in Cloud NetworkingKrauß, Christoph / Fusenig, Volker et al. | 2013
- 122
-
Tracing Sources of Anonymous Slow Suspicious ActivitiesKalutarage, Harsha K. / Shaikh, Siraj A. / Zhou, Qin / James, Anne E. et al. | 2013
- 135
-
Static Analysis for Regular Expression Denial-of-Service AttacksKirrage, James / Rathnayake, Asiri / Thielecke, Hayo et al. | 2013
- 12
-
Next-Generation DoS at the Higher Layers: A Study of SMTP FloodingCartier, Gabriel / Cartier, Jean-François / Fernandez, José M. et al. | 2013
- 164
-
Towards Hybrid Honeynets via Virtual Machine Introspection and CloningLengyel, Tamas K. / Neumann, Justin / Maresca, Steve / Kiayias, Aggelos et al. | 2013
- 178
-
MADS: Malicious Android Applications Detection through String AnalysisSanz, Borja / Santos, Igor / Nieves, Javier / Laorden, Carlos / Alonso-Gonzalez, Iñigo / Bringas, Pablo G. et al. | 2013
- 192
-
X-TIER: Kernel Module InjectionVogl, Sebastian / Kilic, Fatih / Schneider, Christian / Eckert, Claudia et al. | 2013
- 206
-
Leveraging String Kernels for Malware DetectionPfoh, Jonas / Schneider, Christian / Eckert, Claudia et al. | 2013
- 220
-
Insiders Trapped in the Mirror Reveal Themselves in Social MediaKandias, Miltiadis / Galbogini, Konstantina / Mitrou, Lilian / Gritzalis, Dimitris et al. | 2013
- 236
-
On Business Logic Vulnerabilities Hunting: The APP_LogGIC FrameworkStergiopoulos, George / Tsoumas, Bill / Gritzalis, Dimitris et al. | 2013
- 250
-
Using the Smart Card Web Server in Secure Branchless BankingCobourne, Sheila / Mayes, Keith / Markantonakis, Konstantinos et al. | 2013
- 264
-
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning ApproachNaldi, Maurizio / Flamini, Marta / D’Acquisto, Giuseppe et al. | 2013
- 278
-
Efficient and Private Three-Party Publish/SubscribeCrescenzo, Giovanni / Burns, Jim / Coan, Brian / Schultz, John / Stanton, Jonathan / Tsang, Simon / Wright, Rebecca N. et al. | 2013
- 293
-
Marlin: A Fine Grained Randomization Approach to Defend against ROP AttacksGupta, Aditi / Kerr, Sam / Kirkpatrick, Michael S. / Bertino, Elisa et al. | 2013
- 307
-
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer PlatformFeng, Wei / Qin, Yu / Feng, Dengguo / Wei, Ge / Xue, Lihui / Chang, Dexian et al. | 2013
- 321
-
Anomaly Detection for Ephemeral Cloud IaaS Virtual MachinesAlarifi, Suaad / Wolthusen, Stephen et al. | 2013
- 336
-
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization AlgorithmsBertholon, Benoît / Varrette, Sébastien / Bouvry, Pascal et al. | 2013
- 350
-
Forward Secure Certificateless Proxy Signature SchemeLi, Jiguo / Li, Yanqiong / Zhang, Yichen et al. | 2013
- 365
-
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NPLi, Hongda / Niu, Qihua / Liang, Bei et al. | 2013
- 381
-
On the Security of an Efficient Attribute-Based SignatureZhang, Yan / Feng, Dengguo / Zhang, Zhengfeng / Zhang, Liwu et al. | 2013
- 393
-
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice MethodLu, Yao / Zhang, Rui / Lin, Dongdai et al. | 2013
- 405
-
Performance Prediction Model for Block Ciphers on GPU ArchitecturesNishikawa, Naoki / Iwai, Keisuke / Tanaka, Hidema / Kurokawa, Takakazu et al. | 2013
- 424
-
Threshold-Oriented Optimistic Fair ExchangeWang, Yang / Au, Man Ho / Liu, Joseph K. / Yuen, Tsz Hon / Susilo, Willy et al. | 2013
- 439
-
Secure Storage and Fuzzy Query over Encrypted DatabasesLiu, Zheli / Ma, Haoyu / Li, Jin / Jia, Chunfu / Li, Jingwei / Yuan, Ke et al. | 2013
- 451
-
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF EvaluationZhuang, Yunhui / Yang, Anjia / Wong, Duncan S. / Yang, Guomin / Xie, Qi et al. | 2013
- 465
-
Privacy Preserving Context Aware Publish Subscribe SystemsNabeel, Mohamed / Appel, Stefan / Bertino, Elisa / Buchmann, Alejandro et al. | 2013
- 479
-
A New Unpredictability-Based RFID Privacy ModelYang, Anjia / Zhuang, Yunhui / Wong, Duncan S. / Yang, Guomin et al. | 2013
- 493
-
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic EncryptionWeingarten, Florian / Neugebauer, Georg / Meyer, Ulrike / Wetzel, Susanne et al. | 2013
- 507
-
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party SettingWang, Weijia / Hu, Lei / Li, Yong et al. | 2013
- 521
-
Light Weight Network Coding Based Key Distribution Scheme for MANETsLiu, Jianwei / Sangi, Abdur Rashid / Du, Ruiying / Wu, Qianhong et al. | 2013
- 535
-
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information NetworkWang, Chao / Mao, Kefei / Liu, Jianwei / Liu, Jianhua et al. | 2013
- 549
-
Authentication and Key Agreement Based on Hyper-sphere Using Smart CardsTang, Shaohua / Xu, Lingling et al. | 2013
- 563
-
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc NetworksKonstantinou, Elisavet et al. | 2013
- 575
-
Human Identification with Electroencephalogram (EEG) for the Future Network SecurityHuang, Xu / Altahat, Salahiddin / Tran, Dat / Shutao, Li et al. | 2013
- 582
-
Building Better Unsupervised Anomaly Detector with S-TransformPukkawanna, Sirikarn / Hazeyama, Hiroaki / Kadobayashi, Youki / Yamaguchi, Suguru et al. | 2013
- 590
-
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNsChen, Jing / Du, Ruiying / Zhao, Li / Wang, Chiheng / Zheng, Minghui / Xiang, Yang et al. | 2013
- 599
-
Virtually Reconfigurable Secure Wireless Networks Using Broadcast TokensKarthik, Kannan et al. | 2013
- 607
-
On the Use of Key Assignment Schemes in Authentication ProtocolsAlderman, James / Crampton, Jason et al. | 2013
- 614
-
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing SystemsVergara-Laurens, Idalides J. / Mendez-Chaves, Diego / Labrador, Miguel A. et al. | 2013
- 621
-
Security Authentication of AODV Protocols in MANETsAlomari, Ahmad et al. | 2013
- 628
-
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet ApproachGruber, Markus / Schanes, Christian / Fankhauser, Florian / Moutran, Martin / Grechenig, Thomas et al. | 2013
- 635
-
Towards a Privacy-Preserving Solution for OSNsTang, Qiang et al. | 2013
- 642
-
Measuring and Comparing the Protection Quality in Different Operating SystemsHan, Zhihui / Cheng, Liang / Zhang, Yang / Feng, Dengguo et al. | 2013
- 649
-
Collusion-Resistant Domain-Specific Pseudonymous SignaturesBringer, Julien / Chabanne, Hervé / Patey, Alain et al. | 2013
- 656
-
On the Applicability of Time-Driven Cache Attacks on Mobile DevicesSpreitzer, Raphael / Plos, Thomas et al. | 2013
- 663
-
Ancestor Excludable Hierarchical ID-Based Encryption RevisitedZhang, Fan / Guo, Hua / Li, Zhoujun et al. | 2013
- 671
-
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social NetworksLi, Yan / Li, Yingjiu / Yan, Qiang / Deng, Robert H. et al. | 2013
- 678
-
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless NetworksHu, Jia / Lin, Hui / Xu, Li et al. | 2013
- 685
-
Distributed and Anonymous Publish-SubscribeDaubert, Jörg / Fischer, Mathias / Schiffner, Stefan / Mühlhäuser, Max et al. | 2013
- 692
-
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency GraphsAgosta, Giovanni / Barenghi, Alessandro / Pelosi, Gerardo / Scandale, Michele et al. | 2013
- 699
-
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized EnvironmentsHsiao, Shun-Wen / Chen, Yi-Ning / Sun, Yeali S. / Chen, Meng Chang et al. | 2013
- 707
-
Filtering Trolling Comments through Collective Classificationde-la-Peña-Sordo, Jorge / Santos, Igor / Pastor-López, Iker / Bringas, Pablo G. et al. | 2013
- 714
-
Security Analysis of Touch Inputted PasswordsPereira Botelho, Bruno Alves / Nakamura, Emilio Tissato / Uto, Nelson et al. | 2013
- 721
-
A Pairing-Free Identity Based Authentication Framework for Cloud ComputingMishra, Dheerendra / Kumar, Vinod / Mukhopadhyay, Sourav et al. | 2013
- 728
-
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication ProtocolsArmando, Alessandro / Carbone, Roberto / Zanetti, Luca et al. | 2013
- 735
-
Towards a More Secure Apache Hadoop HDFS InfrastructureCohen, Jason / Acharya, Subatra et al. | 2013
- 742
-
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDRAiash, Mahdi et al. | 2013
- 749
-
A Comprehensive Access Control System for Scientific ApplicationsSarfraz, Muhammad I. / Baker, Peter / Xu, Jia / Bertino, Elisa et al. | 2013
- 756
-
Partial Fingerprint Reconstruction with Improved Smooth ExtensionZhou, Wei / Hu, Jiankun / Petersen, Ian / Bennamoun, Mohammed et al. | 2013
- 763
-
Modeling and Analysis for Thwarting Worm Propagation in Email NetworksWen, Sheng / Xiang, Yang / Zhou, Wanlei et al. | 2013
- 770
-
On Secure and Power-Efficient RFID-Based Wireless Body Area NetworkUllah, Sana / Alsalih, Waleed et al. | 2013
- 777
-
Towards Authenticated ObjectsMidi, Daniele / Kundu, Ashish / Bertino, Elisa et al. | 2013
- 784
-
A Finger-Vein Based Cancellable Bio-cryptosystemYang, Wencheng / Hu, Jiankun / Wang, Song et al. | 2013