TIM: Secure and usable authentication for smartphones.
Gi-Chul YangQinwen HuMuhammad Rizwan AsgharPublished in: J. Inf. Secur. Appl. (2022)
Keyphrases
- user authentication
- authentication mechanism
- authentication protocol
- authentication scheme
- password authentication
- security mechanisms
- data encryption
- security analysis
- identity management
- key distribution
- integrity verification
- factor authentication
- security requirements
- secure manner
- smart card
- security services
- mobile devices
- encryption decryption
- quality assurance
- mutual authentication
- secure communication
- experience gained
- key agreement
- biometric authentication
- key exchange protocol
- security issues
- rights management
- lightweight
- authentication systems
- trusted third party
- access control
- mobile applications
- multi party
- public key
- secret key
- security protocols
- augmented reality
- trusted platform module
- daily life
- electronic payment
- security properties
- identity authentication
- digital signature
- desktop computers
- cryptographic protocols
- private key
- key exchange
- information security
- diffie hellman