Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices.
Ahmed Tanvir MahdadMohammed JuburNitesh SaxenaPublished in: MobiCom (2023)
Keyphrases
- mobile devices
- security mechanisms
- mobile learning
- semi fragile watermarking
- mobile phone
- context aware
- mobile computing
- smart phones
- mobile applications
- mobile users
- mobile environments
- mobile commerce
- mobile computing devices
- detect malicious
- digital watermarking
- mobile technologies
- mobile networks
- mobile services
- location aware
- handheld devices
- countermeasures
- location based services
- m learning
- learning activities
- mobile platform
- communication technologies
- resource constrained
- desktop computers
- mobile internet
- watermarking scheme
- small screen
- image authentication
- security requirements
- wireless technologies
- wifi
- mobile terminals
- authentication scheme
- mobile games
- security analysis
- security issues
- remote server
- mobile computing environment
- computing environments
- factor authentication
- learning experience
- wireless sensor networks