Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or email) and password (ID/PW) credential authentication. However, there are numerous vulnerabilities concerning ID/PW credentials. Scholars and the industry have proposed several improved security solutions, such as MFA, however most of the Internet Services have refused to adopt these solutions. Mobile phones are much more sensitive to these vulnerabilities (so this paper focuses on mobile phones). Many users take advantage of password managers, to keep track of all their Internet Service profiles. However, the Internet Service profiles found in password managers, are normally kept on the PC or mobile phone’s disk, in an encrypted form. Our first ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
Secure storage of personal authentication credentials is a long standing problem in computer securit...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Mobile phones are increasingly used as general purpose computing devices with permanent Internet con...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Abstract. In this paper two mobile website authentication schemes are proposed. The first enables au...
Password-based single-sign-on authentication has been widely applied in mobile environments. It enab...
Authentication is the process of validating the identity of an entity, e.g., a person, a machine, et...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
Secure storage of personal authentication credentials is a long standing problem in computer securit...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Mobile phones are increasingly used as general purpose computing devices with permanent Internet con...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Abstract. In this paper two mobile website authentication schemes are proposed. The first enables au...
Password-based single-sign-on authentication has been widely applied in mobile environments. It enab...
Authentication is the process of validating the identity of an entity, e.g., a person, a machine, et...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...