{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:06:19Z","timestamp":1761620779046},"reference-count":18,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1999,4,1]],"date-time":"1999-04-01T00:00:00Z","timestamp":922924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,4]]},"DOI":"10.1016\/s1389-1286(98)00020-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:57:10Z","timestamp":1027637830000},"page":"861-870","source":"Crossref","is-referenced-by-count":35,"title":["Authenticating public terminals"],"prefix":"10.1016","volume":"31","author":[{"given":"N","family":"Asokan","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Steiner","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(98)00020-6_BIB1","unstructured":"N. Asokan et al., Deliverable D02: Preliminary report on basic services, architecture and design, Technical Report, SEMPER Consortium, 1996, SEMPER Project deliverable submitted to the European Commission (available from the authors); see url: http:\/\/www.semper.org for related information."},{"key":"10.1016\/S1389-1286(98)00020-6_BIB2","doi-asserted-by":"crossref","unstructured":"M. Abadi, M. Burrows, C. Kaufman, B. Lampson, Authentication and delegation with smart-cards, Science of Computer Programming 21 (2) (October 1993) 91\u2013113.","DOI":"10.1016\/0167-6423(93)90002-7"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB3","doi-asserted-by":"crossref","unstructured":"oss Anderson, Why cryptosystems fail, in: V. Ashby (Ed.), 1st ACM Conf. on Computer and Communications Security, Fairfax, Virginia, November 1993, pp. 215\u2013227.","DOI":"10.1145\/168588.168615"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB4","doi-asserted-by":"crossref","unstructured":"S. Brands, D. Chaum, Distance-bounding protocols, in: I.B. Damgard (Ed.), Advances in Cryptology \u2013 EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, Springer, Berlin, May 1993, pp. 344\u2013359.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB5","doi-asserted-by":"crossref","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of a family of attack-resistant authentication protocols, IEEE Journal on Selected Areas in Communications 11 (5) (June 1993) 679\u2013693.","DOI":"10.1109\/49.223869"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB6","unstructured":"H. Debar, N. Asokan, M. Steiner, Remote code execution on semi-trusted environment, 1998, in preparation."},{"key":"10.1016\/S1389-1286(98)00020-6_BIB7","unstructured":"A.O. Freier, P. Kariton, P.C. Kocher, The SSL Protocol: Version 3.0, Technical Report, Internet Draft, 1996, Will be eventually replaced by TLS."},{"key":"10.1016\/S1389-1286(98)00020-6_BIB8","doi-asserted-by":"crossref","unstructured":"N. Haller, The S\/Key one-time password system, in: D. Nesset (General Chair), R. Shirey (Program Chair) (Eds.), Symposium on Network and Distributed Systems Security, San Diego, CA, February 1994, Internet Society.","DOI":"10.17487\/rfc1760"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB9","doi-asserted-by":"crossref","unstructured":"M.G. Kuhn, R.J. Anderson, Soft tempest: hidden data transmission using electromagnetic emanations, Workshop on Information Hiding, Portland, OR, April 1998.","DOI":"10.1007\/3-540-49380-8_10"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB10","doi-asserted-by":"crossref","unstructured":"J.T. Kohl, B.C. Neuman, The Kerberos Network Authentication Service (V5), Internet Request for Comment RFC 1510, 1993.","DOI":"10.17487\/rfc1510"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB11","doi-asserted-by":"crossref","unstructured":"T. Matsumoto, Human-computer cryptography: an attempt, in: C. Neuman (Ed.), 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996, pp. 68\u201375.","DOI":"10.1145\/238168.238190"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB12","doi-asserted-by":"crossref","unstructured":"T. Matsumoto, H. Imai, Human identification through insecure channel, in: Advances in Cryptology \u2013 EUROCRYPT'91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, April 1991, pp. 409\u2013421.","DOI":"10.1007\/3-540-46416-6_35"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB13","doi-asserted-by":"crossref","unstructured":"R. Molva, D. Samfat, G. Tsudik, Authentication of mobile users, IEEE Network 8 (2) (March\/April 1994) 26\u201335.","DOI":"10.1109\/65.272938"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB14","doi-asserted-by":"crossref","unstructured":"M. Naor, B. Pinkas, Visual authentication and identification, in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology \u2013 CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, August 1997, pp. 323\u2013336.","DOI":"10.1007\/BFb0052245"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB15","doi-asserted-by":"crossref","unstructured":"R.M. Needham, M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21 (12) (December 1978) 993\u2013999, also Xerox Research Report, CSL-78-4, PARC.","DOI":"10.1145\/359657.359659"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB16","doi-asserted-by":"crossref","unstructured":"M. Naor, A. Shamir, Visual cryptography, in: I.B. Damgard (Ed.), Advances in Cryptology \u2013 EUROCRYPT'94, Lecture Notes in Computer Science, pages 1\u201312. Springer-Verlag, Berlin Germany, 1994.","DOI":"10.1007\/BFb0053419"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB17","doi-asserted-by":"crossref","unstructured":"A. Pftizmann, B. Pfitzmann, M. Schunter, M. Waidner, Trusting mobile user devices and security modules, IEEE Computer 30 (2) (February 1997) 61\u201368.","DOI":"10.1109\/2.566159"},{"key":"10.1016\/S1389-1286(98)00020-6_BIB18","doi-asserted-by":"crossref","unstructured":"J.D. Tygar, A. Whitten. WWW electronic commerce and Java Trojan horses, in: 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 243\u2013250.","DOI":"10.1145\/248052.248054"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128698000206?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128698000206?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:07:29Z","timestamp":1580864849000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128698000206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,4]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1999,4]]}},"alternative-id":["S1389128698000206"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(98)00020-6","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[1999,4]]}}}