Skip to main content

A Secure Authentication Scheme for a Public Terminal Before a Transaction

  • Conference paper
Network-Based Information Systems (NBiS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4658))

Included in the following conference series:

Abstract

Due to the fast progress of the Internet, and with the increasing numbers of public terminals spread everywhere, people can access personal sensitive data or perform transactions easily through these public terminals. Identifying these public terminals is therefore a most urgent topic. We propose an efficient and secure scheme that meets real environmental conditions for authenticating these public terminals before conducting a transaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating public terminates. Computer Networks 31, 861–970 (1999)

    Article  Google Scholar 

  2. Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of a family of attack resistant authentications. IEEE Journal on Selected Areas in Communications 11(5), 679–693 (1993)

    Article  Google Scholar 

  3. Burris, M.W., Pietrzyk, M.C.: Interactive Transportation Information Stations, Center for Urban Transportation Research, College of Engineering, University of South Florida (1997), http://citeseer.nj.nec.com/278953.html

  4. Cheng, C.Y., Seman, K., Yunus, J.: Authentication public terminals with smart cards. In: Proc. TENCON 2000, pp. I-527–I-529 (2000)

    Google Scholar 

  5. Frier, A.O., Kariton, P., Kocher, P.C.: The SSL Protocol: Version 3.0, Technical Report, Internet Draft (1996)

    Google Scholar 

  6. Hochnerg, J., Smith, S.W., Murphy, M., Pedersen, P., Yantis, B.: Kiosk Security Handbook. Los Alamos Unclassified Release LA-UR-95-1657, Los Alamos National Laboratory (1995)

    Google Scholar 

  7. Jan, J.-K., Chen, Y.-Y., Chen, C.-L.: A Realistic Secure Anonymous E-Voting Protocol Based on the ElGamal Scheme. In: Proceedings of the International Conference on Communications & Broadband Networking, Bangalore, INDIA, Sect III 1-9 (2003)

    Google Scholar 

  8. Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (V5), Internet Request for Comment RFC 1510 (1993)

    Google Scholar 

  9. Laufmann, S.C.: Toward Agent-Based Software Engineering for Information-Dependent Enterprise Applications. In: IEE Proceedings of Software Engineering (1997), http://citeseer.ist.psu.edu/laufmann96toward.html

  10. NIST FIP PUB 180, Secure hash standard, National Institute of Standards and Technology, US department of Commerce, DRAFT (1993)

    Google Scholar 

  11. Rivest, R.L.: The MD5 message –digest algorithm, RFC 1231, Internet Activities Board, Internet Privacy Task Force (1992)

    Google Scholar 

  12. Ross, S., Hill, J., Mike, Y.C., Joseph, A.D., Culler, D.E., Brewer, E.A.: A Security Architecture for the Post-PC World, http://citeseer.ist.psu.edu/302477.html

  13. Smith, S.: IBM Research Paul Pedersen, Los Alamos National Laborator, Organizing Electronic Services into Security Taxonomies. In: Proc. of the Second USENIX workshop on Electronic Commerce (1996), http://citeseer.ist.psu.edu/338966.html

  14. Chen, Y.-Y., Jan, J.-K., Chen, C.-L.: The Design of a Securely Anonymous Internet Voting System. Computers & Security 23(4), 330–337 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomoya Enokido Leonard Barolli Makoto Takizawa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, CL., Chen, YY., Jan, JK. (2007). A Secure Authentication Scheme for a Public Terminal Before a Transaction. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74573-0_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74572-3

  • Online ISBN: 978-3-540-74573-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics