Is Secure and Usable Smartphone Authentication Asking Too Much?
Alexander De LucaJanne LindqvistPublished in: Computer (2015)
Keyphrases
- authentication mechanism
- user authentication
- data encryption
- authentication scheme
- authentication protocol
- password authentication
- security mechanisms
- identity management
- security analysis
- factor authentication
- integrity verification
- security requirements
- secure manner
- key distribution
- private key
- smart card
- identity authentication
- secure communication
- mobile devices
- security services
- public key
- security issues
- key agreement
- key management
- key exchange protocol
- encryption decryption
- biometric authentication
- security properties
- information security
- public key cryptography
- public key encryption
- cryptographic protocols
- digital signature
- information sharing
- daily life
- mobile applications
- rights management
- public key infrastructure
- lightweight
- electronic payment
- diffie hellman
- encryption scheme
- access control
- wireless networks
- personal information
- resource constrained
- elliptic curve
- authentication systems
- payment systems
- key agreement protocol
- key exchange