A new anti-phishing method in openID
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, HwanJin | - |
dc.contributor.author | Jeun, InKyung | - |
dc.contributor.author | Chun, Kilsoo | - |
dc.contributor.author | Song, Jung Hwan | - |
dc.date.accessioned | 2022-12-21T01:39:23Z | - |
dc.date.available | 2022-12-21T01:39:23Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2008-08 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/178054 | - |
dc.description.abstract | Following recent developments in digital environments, online services have become more diverse. Because of this, many users find it difficult to manage their ID and password. As such, there is a rising need for effective ID management systems. Among them, OpenID is a simple, light and user-centric ID management system. However, because of OpenID is vulnerable to phishing, so many measures being are taken to solve this problem, although no perfect anti-phishing method has so far been devised. In this paper, new anti-phishing methods using tokens and authentication e-mail are proposed. The suggested methods are based on the assumption that the number of OPs is small, and are hence safer from attack and easier to realize from the technical viewpoint than existing methods. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | A new anti-phishing method in openID | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Song, Jung Hwan | - |
dc.identifier.doi | 10.1109/SECURWARE.2008.38 | - |
dc.identifier.scopusid | 2-s2.0-55849101703 | - |
dc.identifier.bibliographicCitation | Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys., pp.243 - 247 | - |
dc.relation.isPartOf | Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys. | - |
dc.citation.title | Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys. | - |
dc.citation.startPage | 243 | - |
dc.citation.endPage | 247 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Digital environments | - |
dc.subject.keywordPlus | Existing methods | - |
dc.subject.keywordPlus | Management systems | - |
dc.subject.keywordPlus | Online services | - |
dc.subject.keywordPlus | Phishing | - |
dc.subject.keywordPlus | Recent developments | - |
dc.subject.keywordPlus | Internet | - |
dc.subject.keywordPlus | Management | - |
dc.subject.keywordPlus | Information dissemination | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/4622590 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.