Abstract. In this paper two mobile website authentication schemes are proposed. The first enables authentication credentials (username and password) to be stored and retrieved securely from a mobile handset, and requires no changes to existing websites. The second scheme, which may optionally be used with the first, utilises a one-time password and is intended for applications requiring an enhanced level of authentication, e.g. financial services. Both authentication schemes use a Java SIM and ubiquitous mobile phone; with its familiar and convenient form factor and high user acceptance. Both schemes also provide protection against online phishing attacks
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile phones are increasingly used as general purpose computing devices with permanent Internet con...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The number of different identities and credentials used for authentication towards services on the I...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
People's increasingly relying on web applications to manage their digital assets makes web auth...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Abstract: The internet has one of the most convenient and widely used media for people for exchangin...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
Part 4: Data Protection and Identity ManagementInternational audienceMobile phones offer unique adva...
The ever increasing use of internet around the world has without doubt increased the usage of intern...
With the increasing personalization of the Web, many websites allow users to create their own person...
In this paper, we describe a novel method of approving and finalising financial transactions that wo...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile phones are increasingly used as general purpose computing devices with permanent Internet con...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The number of different identities and credentials used for authentication towards services on the I...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
People's increasingly relying on web applications to manage their digital assets makes web auth...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Abstract: The internet has one of the most convenient and widely used media for people for exchangin...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
Part 4: Data Protection and Identity ManagementInternational audienceMobile phones offer unique adva...
The ever increasing use of internet around the world has without doubt increased the usage of intern...
With the increasing personalization of the Web, many websites allow users to create their own person...
In this paper, we describe a novel method of approving and finalising financial transactions that wo...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile phones are increasingly used as general purpose computing devices with permanent Internet con...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...