TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
He SunKun SunYuewu WangJiwu JingPublished in: CCS (2015)
Keyphrases
- user authentication
- mobile devices
- authentication scheme
- security analysis
- daily life
- mobile applications
- security requirements
- data encryption
- key management
- security issues
- evaluation model
- augmented reality
- line segments
- security protocols
- authentication protocol
- security properties
- genetic algorithm
- neural network
- hough transform
- security level
- group communication