Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1953
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBıçakcı, Kemal-
dc.contributor.authorÜnal, Devrim-
dc.contributor.authorAşcıoğlu, Nadir-
dc.contributor.authorAdalıer, Oktay-
dc.date.accessioned2019-07-10T14:42:42Z
dc.date.available2019-07-10T14:42:42Z
dc.date.issued2014
dc.identifier.citationBicakci, K., Unal, D., Ascioglu, N., & Adalier, O. (2014). Mobile authentication secure against man-in-the-middle attacks. Procedia Computer Science, 34, 323-329.en_US
dc.identifier.issn1877-0509
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S1877050914008862?via%3Dihub-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/1953-
dc.description9th International Conference on Future Networks and Communications(2014 : Canada)
dc.description.abstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. (c) 2014 The Authors. Published by Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherELSEVIER Science BVen_US
dc.relation.ispartofProcedia Computer Scienceen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectAuthenticationen_US
dc.subjectPhishingen_US
dc.subjectMan-In-The-Middle attacken_US
dc.subjectSecure elementen_US
dc.subjectMobile signatureen_US
dc.subjectSecurity protocolen_US
dc.titleMobile Authentication Secure Against Man-In Attacksen_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.volume34
dc.identifier.startpage323
dc.identifier.endpage329
dc.identifier.wosWOS:000349979900039en_US
dc.identifier.scopus2-s2.0-84906808148en_US
dc.institutionauthorBıçakçı, Kemal-
dc.identifier.doi10.1016/j.procs.2014.07.031-
dc.authorscopusid6603355557-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusquality--
item.openairetypeConference Object-
item.languageiso639-1en-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

8
checked on Dec 21, 2024

WEB OF SCIENCETM
Citations

11
checked on Nov 9, 2024

Page view(s)

70
checked on Dec 23, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.