Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/12478
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBicakci, K.-
dc.contributor.authorUnal, D.-
dc.contributor.authorAscioglu, N.-
dc.contributor.authorAdalier, O.-
dc.date.accessioned2025-05-10T19:33:11Z-
dc.date.available2025-05-10T19:33:11Z-
dc.date.issued2014-
dc.identifier.issn1877-0509-
dc.identifier.urihttps://doi.org/10.1016/j.procs.2014.07.031-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/12478-
dc.description.abstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. © 2014 The Authors. Published by Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.relation.ispartofProcedia Computer Science -- 9th International Conference on Future Networks and Communications, FNC 2014 and the 11th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2014 -- 17 August 2014 through 20 August 2014 -- Niagara Falls, ON -- 130208en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectAuthenticationen_US
dc.subjectMan-In-The-Middle Attacken_US
dc.subjectMobile Signatureen_US
dc.subjectPhishingen_US
dc.subjectSecure Elementen_US
dc.subjectSecurity Protocolen_US
dc.titleMobile Authentication Secure Against Man-In Attacksen_US
dc.typeConference Objecten_US
dc.departmentTOBB University of Economics and Technologyen_US
dc.identifier.volume34en_US
dc.identifier.startpage323en_US
dc.identifier.endpage329en_US
dc.identifier.scopus2-s2.0-84906808148-
dc.identifier.doi10.1016/j.procs.2014.07.031-
dc.authorscopusid6603355557-
dc.authorscopusid57207703040-
dc.authorscopusid56252592300-
dc.authorscopusid23472255900-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ2-
dc.identifier.wosqualityN/A-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.