Secure Fallback Authentication and the Trusted Friend Attack.
Ashar JavedDavid BletgenFlorian KohlarMarkus DürmuthJörg SchwenkPublished in: ICDCS Workshops (2014)
Keyphrases
- authentication mechanism
- trust relationships
- authentication protocol
- data encryption
- identity management
- key agreement
- secret key
- password authentication
- authentication scheme
- key exchange protocol
- key distribution
- trusted platform module
- security services
- user authentication
- social networks
- trusted computing
- security analysis
- social networking
- security mechanisms
- personal information
- smart card
- security protocols
- secure communication
- lightweight
- factor authentication
- security measures
- remote attestation
- secure multi party
- mutual authentication
- access control
- social network analysis
- multi party
- public key
- online social networks
- elliptic curve
- trust model
- key agreement protocol
- trusted third party
- public key infrastructure
- encryption algorithm
- security requirements
- encryption decryption
- ad hoc networks
- security issues
- secure manner
- integrity verification
- block cipher
- rights management
- security model
- diffie hellman
- cryptographic protocols
- security properties