The untrusted computer problem and camera-based authentication

D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. Van Dijk, S. Devadas, R. Rivest

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© Springer-Verlag Berlin Heidelberg 2002.The use of computers in public places is increasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a public terminal will not satisfy most users. In this paper the aim is therefore to provide the user with authenticated communication between herself and a remote trusted computer, via the untrusted computer. After defining the authentication problem that is to be solved, this paper reduces it to a simpler problem. Solutions to the simpler problem are explored in which the user carries a trusted device with her. Finally, a description is given of two camera-based devices that are being developed.
Original languageEnglish
Title of host publicationPervasive Computing - 1st International Conference, Pervasive 2002, Proceedings
EditorsF. Mattern, M. Naghshineh
PublisherSpringer Verlag
Pages114-124
ISBN (Print)3540440607, 9783540440604
DOIs
Publication statusPublished - 2002
Externally publishedYes
Event1st International Conference on Pervasive Computing, Pervasive 2002 - Zurich, Switzerland
Duration: 26 Aug 200228 Aug 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Pervasive Computing, Pervasive 2002
Country/TerritorySwitzerland
CityZurich
Period26/08/0228/08/02

Fingerprint

Dive into the research topics of 'The untrusted computer problem and camera-based authentication'. Together they form a unique fingerprint.

Cite this