freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內容

中文--使用移動電話進行網上銀行身份驗證-資料下載頁

2025-05-12 17:39本頁面

【導讀】在過去幾年中,已經制定了一些方法,包括密碼令牌、短信密碼、USB令牌,已經在網上銀行身份認證中開發(fā)使用。我們的方法是,通過為用戶的移動電話存儲數字證書,以此提高性能和穩(wěn)定性來對抗各種在移動電話使用中的攻擊。我們提供攻擊分析以此顯示這個協(xié)議的優(yōu)點。因此,對于金融機構,在他們網上銀行服務的過程中,客戶端認證已成為一個關鍵的安全關切。另一方面,安全管理密碼對于大多數人是相當棘手的。此外,手機OTP容易泄漏,因為這讓攻擊者竊聽明文發(fā)送的SMS消息。USB令牌方案作為網上身份認證的解決方案,其有不爭的優(yōu)勢,但是它也暴露了一堆缺陷。這很尷尬,因為每當用戶想要使用網上銀行時,客戶需要額外的USB閃存驅動器。如果令牌丟失,它可能不會是個大問題,但它的確阻礙了用戶一段時間內使用網上銀行。更嚴重的缺陷是,該計劃不能防止假交易被簽署

  

【正文】 ing Mobile Phones, IEEE/ACS International Conference on Computer Systems andApplications, Rabat, Morocco, May 2009.[7] S. Santesson, R. Housley, S. Bajaj, and L. Rosenthol,Internet Public Key Infrastructure – Certificate Image, Internet Engineering Task Force, November 2009.[8] J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung,FourthFactor Authentication: Somebody You Know,Proceedings of the 13th ACM conference on Computer and munications security, Virginia, October 2006.[9] BethGivens, PrivacyToday: A Review of Current Issues,Privacy Rights Clearing House. Availble online:[10] Bank of Communications.[ Availble online:] [11] Industrial and Commercial Bank of online:/usbshieldpersonalaccount/[12] Agricultural Bank of China. [Availble online][13] Shenzhen Development Bank.[Availble online:73/534442/7072696d617279/656e/506572736f6e616c46696e616e63696e67/456c656374726f6e696342616e6b696e67/4f6e6c696e6542616e6b696e67/5468655573656f665553424b65792e68746d6c[14] Trusted Computing Group, Availble online:[15] Trusted Computing Group, Trusted Platform Module Summary. Availble online:[16] M. Mannan and P. Van Oorschot, Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Proceedings of FinancialCryptography and Data Security, March 2007.[17] G. Yan and S. Eidenbenz, Bluetooth worms: Models,dynamics, and defense implications, 22nd Annual Computer Security Applications Conference, MiamiBeach, FL, USA, 2006[18] N. Leavitt, Malicious Code Moves to Mobile Devices,Computer, vol. 33, 2000, pp. 1619[19] M. Kabay, Some Notes on Malware,Ubiquity, Vol. 6,2005, pp. 11[20] ICANN Security and Stability Advisory Committee,Domain Name Hijacking: Incidents, Threats, Risks, and Remedial Actions, A Report from the ICANN Security and Stability Advisory Committee (SSAC), July 2005.
點擊復制文檔內容
畢業(yè)設計相關推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1