期刊文献+

可信计算环境下的防钓鱼攻击技术

Study on Anti-Phishing Based on Trusted Computing Technology
下载PDF
导出
摘要 网络欺诈和钓鱼攻击等在线攻击行为已经成为重要的网络安全问题。该文在讨论在线用户认证的基础上,提出了一种基于可信计算技术的在线用户认证技术。该技术可使某些钓鱼攻击失效,且可以抵抗其他类型的在线攻击。 Web spoofing, phishing and other online attacks has been the most severe issues on web secrity. In this paper the issue of online user authentication is discussed, and a method for online user authentication using trusted computing platforms is proposed. The proposed approach makes a class of phishing attacks ineffective; moreover, the proposed method can also be used to protect against other online attacks.
出处 《计算机安全》 2008年第9期3-6,共4页 Network & Computer Security
关键词 SSL/TLS TCG 钓鱼 SSL/TLS TCG Phishing
  • 相关文献

参考文献8

  • 1T.Dierks,,C.Allen.The TLS Protocol1.0[].RFC.1999
  • 2Anti-Phishing Working Group.Phishing Activity Trends Report2. http://www.antiphishing.org . 2005
  • 3Edward W Felten,,Dirk Balfanz,Drew Dean,etc.Web Spoofing:An Internet Con Game[].‘Proceedings ofth National Information Systems Security Conference’.1997
  • 4Trusted Computing Group.TCG Specification Architecture Overview.Specification Revision1.2[].https://wwwtrustedcomputinggrouporg.
  • 5Trusted Computing Group.TPM Specification,Version1.2[].https://wwwtrustedcomputinggrouporg.2005
  • 6Rachna Dhamija,J.D.Tygar.The Battle Against Phishing:Dynamic Security Skins[].Symposium On Usable Privacy and Security(SOUPS).2005
  • 7Ernie Brickell,Jan Camenisch,Liqun Chen.Direct anonymous attestation[].‘Proceedings of theth ACM Conference on Computer and Communications SecurityCCS’.
  • 8GEER D.Security technologies go phishing[].IEEE Computer.2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部