{"id":"https://openalex.org/W1646239715","doi":"https://doi.org/10.1007/978-3-8348-9283-6_39","title":"Hardened Client Platforms for Secure Internet Banking","display_name":"Hardened Client Platforms for Secure Internet Banking","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1646239715","doi":"https://doi.org/10.1007/978-3-8348-9283-6_39","mag":"1646239715"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_39","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074051446","display_name":"Corrado Ronchi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"C. Ronchi","raw_affiliation_strings":["EISST Development Laboratories, UK","EISST Development Laboratories"],"affiliations":[{"raw_affiliation_string":"EISST Development Laboratories, UK","institution_ids":[]},{"raw_affiliation_string":"EISST Development Laboratories","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009843958","display_name":"S. Zakhidov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Zakhidov","raw_affiliation_strings":["EISST Development Laboratories, UK","EISST Development Laboratories"],"affiliations":[{"raw_affiliation_string":"EISST Development Laboratories, UK","institution_ids":[]},{"raw_affiliation_string":"EISST Development Laboratories","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074051446"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.15475071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"367","last_page":"379"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9377999901771545,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9377999901771545,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9146000146865845,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9038000106811523,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.654463529586792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5939971208572388},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5437167882919312},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5211758017539978},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4961441457271576},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.491854190826416},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32042184472084045},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24657532572746277}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.654463529586792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5939971208572388},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5437167882919312},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5211758017539978},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4961441457271576},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.491854190826416},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32042184472084045},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24657532572746277},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_39","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1488792172"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4286284259","https://openalex.org/W1507118973","https://openalex.org/W2004781009"],"abstract_inverted_index":{"We":[0,74],"review":[1],"the":[2,11,29,43,47,53,84,87,95,108,112,121,144],"security":[3,54],"of":[4,15,38,55,90,97,110,123,148],"e-banking":[5,82],"platforms":[6],"with":[7,102,105],"particular":[8],"attention":[9],"to":[10,45,107,132,135,142,153],"exploitable":[12],"attack":[13,18],"vectors":[14],"three":[16],"main":[17],"categories:":[19],"Man-in-the-Middle,":[20],"Man-in-the-PC":[21],"and":[22,71,77,86,138,141,146],"Man-in-the-Browser.":[23],"It":[24,116],"will":[25,75,117],"be":[26,60,118],"shown":[27,119],"that":[28,120],"most":[30],"serious":[31],"threats":[32],"come":[33],"from":[34],"combination":[35],"attacks":[36,151],"capable":[37],"hacking":[39],"any":[40,56],"transaction":[41],"without":[42],"need":[44,109],"control":[46],"authentication":[48,57],"process.":[49],"Using":[50],"this":[51],"approach,":[52],"system":[58],"can":[59],"bypassed,":[61],"including":[62],"those":[63],"using":[64],"SecureID":[65],"Tokens,":[66,68],"OTP":[67],"Biometric":[69],"Sensors":[70],"Smart":[72],"Cards.":[73],"describe":[76],"compare":[78],"two":[79],"recently":[80],"proposed":[81],"platforms,":[83],"ZTIC":[85],"USPD,":[88],"both":[89],"which":[91],"are":[92],"based":[93],"on":[94],"use":[96,122],"dedicated":[98],"client":[99,114],"devices,":[100],"but":[101],"diverging":[103],"approaches":[104],"respect":[106],"hardening":[111],"Web":[113],"application.":[115],"a":[124],"Hardened":[125],"Browser":[126],"(or":[127],"H-Browser)":[128],"component":[129],"is":[130],"critical":[131],"force":[133],"attackers":[134],"employ":[136],"complex":[137],"expensive":[139],"techniques":[140],"reduce":[143],"strength":[145],"variety":[147],"social":[149],"engineering":[150],"down":[152],"physiological":[154],"fraud":[155],"levels.":[156]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
