Proceedings of the 2007 Workshop on New Security Paradigms 2008
DOI: 10.1145/1600176.1600181
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated names

Abstract: Currently, most means of communication include some form of identification of the sender/originator, but none of these identifications are securely authenticated (at least not conveniently or in wide use). Legitimate business entities can be misrepresented by their name, and this creates opportunities for various scams known as phishing. We propose a new end-to-end authentication scheme that can be used to authenticate companies over many means of communication including telephony, email, web, and Instant Mess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…In [4] it is shown how domain names suffer from the same problem and proposes to authenticate "Identity" as the solution. In general, the approach is based on X.509 certificates and the trust model is based on the existing trademark systems.…”
Section: The Realname Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4] it is shown how domain names suffer from the same problem and proposes to authenticate "Identity" as the solution. In general, the approach is based on X.509 certificates and the trust model is based on the existing trademark systems.…”
Section: The Realname Approachmentioning
confidence: 99%
“…We prototype a strong identity authentication mechanism relying on a new trust model -the RealName registry [4] for IP telephone. This mechanism targets both Business-to-Customer (B2C) applications -e.g.…”
Section: Introductionmentioning
confidence: 99%