Towards incorporating honeywords in n-session recording attack resilient unaided authentication services.
Nilesh ChakrabortySamrat MondalPublished in: IET Inf. Secur. (2019)
Keyphrases
- trust relationships
- authentication mechanism
- identity management
- session initiation protocol
- authentication protocol
- service providers
- security services
- public key infrastructure
- biometric authentication
- service discovery
- web services
- service oriented
- service composition
- mobile services
- mobile commerce
- user centric
- ubiquitous computing
- information services
- search engine
- secret key
- security protocols
- trust model
- computing environments
- lightweight
- context aware
- data encryption
- electronic payment
- end users
- mobile devices
- virtual private network