Secure Messaging Authentication Ceremonies Are Broken.
Amir HerzbergHemi LeibowitzKent E. SeamonsElham VaziripourJustin WuDaniel ZappalaPublished in: IEEE Secur. Priv. (2021)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- authentication protocol
- password authentication
- data encryption
- identity management
- security mechanisms
- integrity verification
- factor authentication
- key distribution
- security analysis
- secure manner
- security requirements
- fault tolerant
- smart card
- rights management
- security services
- public key infrastructure
- identity authentication
- public key encryption
- cloud computing
- private key
- resource constrained
- secure communication
- information sharing
- public key
- electronic payment
- key management
- key exchange protocol
- biometric authentication
- access control
- key agreement protocol
- public key cryptography
- authentication systems
- security protocols
- graphical password
- publish subscribe
- encryption decryption
- mutual authentication
- key agreement
- information security
- diffie hellman
- group communication
- biometric data