Secure mobile computing via public terminals

21Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals to handle personal data may compromise privacy. We present a system that enables users to access their applications and data securely using a combination of public terminals and a more trusted, personal device. Our system (i) provides users with capabilities to censor the public terminal display, so that it does not show private data; (ii) filters input events coming from the public terminal, so that maliciously injected keyboard/pointer events do not compromise privacy; and (iii) enables users to view personal information and perform data-entry via their personal device. A key feature of our system is that it works with unmodified applications. A prototype implementation of the system has been publicly released for Linux and Windows. The results arising from a pilot usability study based on this implementation are presented. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Sharp, R., Scott, J., & Beresford, A. R. (2006). Secure mobile computing via public terminals. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3968 LNCS, pp. 238–253). Springer Verlag. https://doi.org/10.1007/11748625_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free