Mobile Authentication Secure against Man-in-the-Middle Attacks.
Kemal BicakciDevrim UnalNadir AsciogluOktay AdalierPublished in: MobileCloud (2014)
Keyphrases
- security mechanisms
- factor authentication
- security protocols
- security requirements
- security issues
- authentication protocol
- resource constrained
- smart card
- access control
- mobile commerce
- security services
- user authentication
- authentication mechanism
- authentication scheme
- cryptographic protocols
- identity management
- secure routing
- mobile devices
- integrity verification
- secure communication
- data encryption
- mobile terminals
- semi fragile watermarking
- security analysis
- stream cipher
- password authentication
- security measures
- countermeasures
- digital signature
- public key infrastructure
- detect malicious
- secure manner
- rights management
- chosen plaintext
- key distribution
- rfid tags
- encryption decryption
- trusted third party
- biometric authentication
- image authentication
- block cipher
- security model
- digital watermarking
- secret key
- digital images