Mobile Authentication Secure Against Man-In-The-Middle Attacks.
Kemal BicakciDevrim UnalNadir AsciogluOktay AdalierPublished in: FNC/MobiSPC (2014)
Keyphrases
- security mechanisms
- factor authentication
- security protocols
- security issues
- security requirements
- authentication protocol
- security services
- resource constrained
- authentication mechanism
- stream cipher
- authentication scheme
- cryptographic protocols
- security analysis
- user authentication
- identity management
- access control
- data encryption
- mobile commerce
- mobile devices
- secure routing
- smart card
- digital signature
- chosen plaintext
- security measures
- password authentication
- key distribution
- mobile terminals
- secure communication
- countermeasures
- secret key
- integrity verification
- digital watermarking
- information security
- semi fragile watermarking
- secure manner
- lightweight
- detect malicious
- key agreement
- encryption decryption
- security properties
- private key
- rfid tags
- image authentication
- rights management
- security model
- key exchange protocol
- computing environments