Translated Title
Authentication scheme based on trusted computing of preventing phishing attacks
Translated Abstract
User authentication is mostly carried out by sending a pair of useraame and password to the server in insecure network, since most users have not a certificate. Just based on this fact, some attacks are achieved. The method of phishing and the common mechanism of protecting key are analyzed, and an authentication scheme employing trusted computing technology is proposed. Since the scheme combines protected storage, authentication chain, and password partition etc, thieving only the password will not have an affect on user security. In the end, the proposed approach is proven to protect against phishing attacks.
Translated Keyword
TPM
trusted computing
internet fraud
authentication scheme
certificate
Access Number
WF:perioarticaljsjgcysj200921010
Corresponding authors email