{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T16:50:07Z","timestamp":1761843007690,"version":"3.30.1"},"reference-count":34,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,6,1]],"date-time":"2002-06-01T00:00:00Z","timestamp":1022889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,6]]},"DOI":"10.1016\/s0167-4048(02)00312-7","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T12:48:50Z","timestamp":1034340530000},"page":"253-265","source":"Crossref","is-referenced-by-count":48,"title":["On the Security of Today\u2019s Online Electronic Banking Systems"],"prefix":"10.1016","volume":"21","author":[{"given":"Joris","family":"Claessens","sequence":"first","affiliation":[]},{"given":"Valentin","family":"Dem","sequence":"additional","affiliation":[]},{"given":"Danny","family":"De Cock","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00312-7_BIB1","unstructured":"Ross Anderson and Markus Kuhn. Tamper Resistance \u2014 a Cautionary Note. In Proceedings of the Second USENIX Workshop on Electronic Commerce, 1996, pp. 1\u201311."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB2","unstructured":"Tim Berners-Lee and Mark Fischetti. Weaving the Web \u2014 The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor. HarperCollins Publishers, 1999."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB3","unstructured":"Joan Daemen and Vincent Rijmen. Rijndael, the Advanced Encryption Standard. Dr. Dobb\u2019s Journal, 26(3), March 2001, pp. 137\u2013139."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB4","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Christopher Allen. The TLS Protocol Version 1.0. IETF Request for Comments, RFC 2246, January 1999.","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB5","unstructured":"Digipass. http:\/\/www.vasco.com\/."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB6","unstructured":"Hans Dobbertin. The Status of MD5 After a Recent Attack. RSA Laboratories\u2019 CryptoBytes, 2(2), 1996, pp. 1\u20136."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB7","unstructured":"Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach. Web Spoofing: An Internet Con Game. In Proceedings of the 20th National Information Systems Security Conference, 1997, pp. 95\u2013103."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB8","unstructured":"FINREAD. Financial Transactional IC Card Reader. CEN Workshop Agreement, CWA 14174, July 2001."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB9","unstructured":"Federal Information Processing Standard. Data Encryption Standard (DES). FIPS PUB 46-3, US Department of Commerce, National Institute of Standards and Technology, October 1999."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB10","unstructured":"Federal Information Processing Standard. Digital Signature Standard (DSS). FIPS PUB 186-2, US Department of Commerce, National Institute of Standards and Technology, January 2000."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB11","doi-asserted-by":"crossref","unstructured":"Federal Information Processing Standard. Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology, November 2001.","DOI":"10.6028\/NIST.FIPS.197"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB12","unstructured":"Simson Garfinkel and Gene Spafford. Practical UNIX & Internet Security, 2nd Edition. O\u2019Reilly, 1996."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB13","doi-asserted-by":"crossref","unstructured":"Neil Haller, Craig Metz, Phil Nesser, and Mike Straw. A One-Time Password System. IETF Request for Comments, RFC 2289, February 1998.","DOI":"10.17487\/rfc2289"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB14","unstructured":"ITU-T Recommendation X.509 \u2014 ISO\/IEC 9594-8. Information Technology \u2014 Open Systems Interconnection \u2014 The Directory: Public-Key and Attribute Certificate Frameworks. 4th edition, 2001."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB15","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and Susanne Wetzel. Security Weaknesses in Bluetooth. In D. Naccache, editor, Topics in Cryptology \u2014 Proceedings of the Cryptographers\u2019 Track at RSA 2001, Lecture Notes in Computer Science, LNCS 2020, Springer-Verlag, 2001, pp. 176\u2013191.","DOI":"10.1007\/3-540-45353-9_14"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB16","unstructured":"Dirk Janssens, Ronny Bjones, and Joris Claessens. KeyGrab TOO \u2014 The search for keys continues\u2026 Utimaco White Paper, 2000. 11 pps. http:\/\/www.utimaco.com\/."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB17","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology \u2014 CRYPTO\u201999, Lecture Notes in Computer Science, LNCS 1666, Springer-Verlag, 1999, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB18","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk, Mihir Bellare, and Ran Canetti. HMAC: Keyed-Hashing for Message Authentication. IETF Request for Comments, RFC 2104, February 1997.","DOI":"10.17487\/rfc2104"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB19","doi-asserted-by":"crossref","unstructured":"Leslie Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11), November 1981, pp. 770\u2013772.","DOI":"10.1145\/358790.358797"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB20","unstructured":"Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, and Ruth C. Taylor. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, October 1998, pp. 303\u2013314."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB21","unstructured":"Gary McGraw and Ed Felten. Security JAVA \u2014 Getting Down to Business with Mobile Code. John Wiley & Sons, 1999."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB22","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB23","doi-asserted-by":"crossref","unstructured":"Robert Morris and Ken Thompson. Password Security: A Case History. Communications of the ACM, 22(11), 1979, pp. 594\u2013597.","DOI":"10.1145\/359168.359172"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB24","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. Diffie-Hellman Key Agreement Method. IETF Request for Comments, RFC 2631, June 1999.","DOI":"10.17487\/rfc2631"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB25","unstructured":"Eric Rescorla. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, 2000."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB26","unstructured":"SecurID. http:\/\/www.rsasecurity.com\/."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB27","doi-asserted-by":"crossref","unstructured":"Adi Shamir and Nicko van Someren. Playing \u201cHide and Seek\u201d with Stored Keys. In M. Franklin, editor, Proceedings of the Third International Conference on Financial Cryptography, Lecture Notes in Computer Science, LNCS 1648, Springer-Verlag, 1999, pp. 118\u2013124.","DOI":"10.1007\/3-540-48390-X_9"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB28","unstructured":"Marc Slemko. Microsoft passport to trouble. http:\/\/alive.znep.com\/marcs\/passport\/, November 2001."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB29","doi-asserted-by":"crossref","unstructured":"Adrian Spalka, Armin B. Cremers, and Hanno Langweg. Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. In Michel Dupuy and Pierre Paradinas, editors, Trusted Information \u2014 The New Decade Challenge \u2014 Proceedings of IFIP SEC 2001, Kluwer Academic Publishers, 2001, pp. 403\u2013419.","DOI":"10.1007\/0-306-46998-7_28"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB30","unstructured":"TCPA. Trusted Computing Platform Alliance. http:\/\/www.trustedpc.org\/."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB31","doi-asserted-by":"crossref","unstructured":"Klaus Vedder. GSM: Security, Services and the SIM. In B. Preneel and V. Rijmen, editors, State of the Art in Applied Cryptography, Lecture Notes in Computer Science, LNCS 1528, Springer-Verlag, 1998, pp. 227\u2013243.","DOI":"10.1007\/3-540-49248-8_10"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB32","unstructured":"Wireless Application Protocol Forum. http:\/\/www.wapforum.org\/."},{"key":"10.1016\/S0167-4048(02)00312-7_BIB33","doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Forum. WAP Wireless Transport Layer Security. Version 06-Apr-2001.","DOI":"10.1049\/cp:20010502"},{"key":"10.1016\/S0167-4048(02)00312-7_BIB34","unstructured":"Yougu Yuan, Eileen Zishuang Ye, and Sean Smith. Web Spoofing 2001. Department of Computer Science, Dartmouth College, Technical Report TR2001-409, July 2001."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802003127?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802003127?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T02:56:13Z","timestamp":1733712973000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802003127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,6]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,6]]}},"alternative-id":["S0167404802003127"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00312-7","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2002,6]]}}}