Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/12478
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bicakci, K. | - |
dc.contributor.author | Unal, D. | - |
dc.contributor.author | Ascioglu, N. | - |
dc.contributor.author | Adalier, O. | - |
dc.date.accessioned | 2025-05-10T19:33:11Z | - |
dc.date.available | 2025-05-10T19:33:11Z | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 1877-0509 | - |
dc.identifier.uri | https://doi.org/10.1016/j.procs.2014.07.031 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/12478 | - |
dc.description.abstract | Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. © 2014 The Authors. Published by Elsevier B.V. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier B.V. | en_US |
dc.relation.ispartof | Procedia Computer Science -- 9th International Conference on Future Networks and Communications, FNC 2014 and the 11th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2014 -- 17 August 2014 through 20 August 2014 -- Niagara Falls, ON -- 130208 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Authentication | en_US |
dc.subject | Man-In-The-Middle Attack | en_US |
dc.subject | Mobile Signature | en_US |
dc.subject | Phishing | en_US |
dc.subject | Secure Element | en_US |
dc.subject | Security Protocol | en_US |
dc.title | Mobile Authentication Secure Against Man-In Attacks | en_US |
dc.type | Conference Object | en_US |
dc.department | TOBB University of Economics and Technology | en_US |
dc.identifier.volume | 34 | en_US |
dc.identifier.startpage | 323 | en_US |
dc.identifier.endpage | 329 | en_US |
dc.identifier.scopus | 2-s2.0-84906808148 | - |
dc.identifier.doi | 10.1016/j.procs.2014.07.031 | - |
dc.authorscopusid | 6603355557 | - |
dc.authorscopusid | 57207703040 | - |
dc.authorscopusid | 56252592300 | - |
dc.authorscopusid | 23472255900 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | Q2 | - |
dc.identifier.wosquality | N/A | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.