Authenticating public terminals

Research output: Contribution to journalArticlepeer-review

Abstract

Automatic teller machines, Internet kiosks etc. are examples of public untrusted terminals which are used to access computer systems. One of the security concerns in such systems is the so called fake terminal attack: the attacker sets up a fake terminal and fools unsuspecting users into revealing sensitive information, such as PINs or private e-mail, in their attempt to use these terminals. In this paper, we examine this problem in different scenarios and propose appropriate solutions. Our basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information.

Original languageEnglish
Pages (from-to)861-870
Number of pages10
JournalComputer Networks
Volume31
Issue number8
DOIs
Publication statusPublished - 23 Apr 1999
Externally publishedYes

Fingerprint

Dive into the research topics of 'Authenticating public terminals'. Together they form a unique fingerprint.

Cite this