Towards Usable and Secure Location-based Smartphone Authentication.
Geumhwan ChoSungsu KwagJun Ho HuhBedeuro KimChoong-Hoon LeeHyoungshick KimPublished in: SOUPS @ USENIX Security Symposium (2021)
Keyphrases
- authentication mechanism
- authentication scheme
- user authentication
- mobile devices
- password authentication
- data encryption
- authentication protocol
- integrity verification
- factor authentication
- identity management
- key distribution
- security mechanisms
- security requirements
- security analysis
- secure manner
- security services
- private key
- secure communication
- electronic payment
- smart card
- identity authentication
- public key cryptography
- biometric authentication
- key agreement protocol
- key exchange protocol
- mobile applications
- social networking
- public key
- rights management
- key agreement
- mutual authentication
- mobile phone
- cloud computing
- key management
- secret key
- daily life
- public key encryption
- access control
- encryption decryption
- location based services
- trusted third party
- information security
- security issues
- lightweight
- personal information
- diffie hellman
- elliptic curve cryptography
- resource constrained
- security model
- cryptographic protocols
- image authentication