Filters








1 Hit in 4.0 sec

Outflanking and securely using the PIN/TAN-System [article]

A. Wiesmaier, M. Fischer, M. Lippert, J. Buchmann
2005 arXiv   pre-print
The PIN/TAN-system is an authentication and authorization scheme used in e-business. Like other similar schemes it is successfully attacked by criminals.  ...  Also the providers support the attacks by having implementation flaws in their installations. Finally we show that the PIN/TAN-system is not suitable for usage in highly secure applications.  ...  ACCOMPLISHED ATTACK The issue of this Section is the question how to outflank the PIN/TAN-system and whether this is easy.  ... 
arXiv:cs/0410025v3 fatcat:mvoreu53prda3czivlolkelgci