The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protocol. This thesis focuses on developing a system that can circumvent MITB attacks using a two-phase secure-user authentication system, with phases that i...
As the functionality and services provided by mobile devices increases, the need to provide effectiv...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Abstract The focus of this thesis is to investigate solutions that shall enhance the security of rem...
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid ...
9th International Conference on Future Networks and Communications(2014 : Canada)Current mobile auth...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
In this paper, we describe a novel method of approving and finalising financial transactions that wo...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
The number of different identities and credentials used for authentication towards services on the I...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Despite their proven security breaches, text passwords have been dominating all other methods of hum...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Over the last few years, there has been an almost exponential increase of the number of mobile appli...
As the functionality and services provided by mobile devices increases, the need to provide effectiv...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Abstract The focus of this thesis is to investigate solutions that shall enhance the security of rem...
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid ...
9th International Conference on Future Networks and Communications(2014 : Canada)Current mobile auth...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
In this paper, we describe a novel method of approving and finalising financial transactions that wo...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
The number of different identities and credentials used for authentication towards services on the I...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
Despite their proven security breaches, text passwords have been dominating all other methods of hum...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Over the last few years, there has been an almost exponential increase of the number of mobile appli...
As the functionality and services provided by mobile devices increases, the need to provide effectiv...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Abstract The focus of this thesis is to investigate solutions that shall enhance the security of rem...