Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices.
Hui LiXuesong PanXinluo WangHaonan FengChengjie ShiPublished in: Wirel. Commun. Mob. Comput. (2020)
Keyphrases
- authentication protocol
- mobile devices
- security protocols
- smart card
- key exchange protocol
- lightweight
- mobile phone
- context aware
- security analysis
- cryptographic protocols
- secret key
- mobile learning
- denial of service attacks
- rfid tags
- mutual authentication
- embedded devices
- public key
- remote server
- key distribution
- mobile computing
- mobile users
- location aware
- smart phones
- desktop computers
- tablet computers
- mobile commerce
- wifi
- mobile environments
- mobile technologies
- mobile applications
- internet access
- computing devices
- end to end
- learning activities
- hardware platforms
- distributed systems