Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

A formal analysis of authentication protocols for mobile devices in next generation networks

M Aiash - Concurrency and Computation: Practice and …, 2015 - Wiley Online Library
Summary Next Generation Networks comprise a wide variety of access technologies such
as 2G/3G, WLAN as well as the Long‐Term Evolution (LTE) networks. In this environment …

[PDF][PDF] Extending Formal Analysis of Mobile Device Authentication.

WR Claycomb, D Shin - J. Internet Serv. Inf. Secur., 2011 - jisis.org
Authentication between mobile devices in ad-hoc computing environments is a challenging
problem. Without pre-shared knowledge, existing applications must rely on additional …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Progressive authentication: deciding when to authenticate on mobile phones

O Riva, C Qin, K Strauss… - 21st USENIX Security …, 2012 - usenix.org
Mobile users are often faced with a trade-off between security and convenience. Either users
do not use any security lock and risk compromising their data, or they use security locks but …

UACAP: A unified auxiliary channel authentication protocol

R Mayrhofer, J Fuß, I Ion - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
Authenticating spontaneous interactions between devices and users is challenging for
several reasons: the wireless (and therefore invisible) nature of device communication, the …

A framework for continuous, transparent mobile device authentication

H Crawford, K Renaud, T Storer - Computers & Security, 2013 - Elsevier
We address two distinct problems with de facto mobile device authentication, as provided by
a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis …

An architecture for secure mobile devices

R Mayrhofer - Security and Communication Networks, 2015 - Wiley Online Library
Mobile devices such as smart phones have become one of the preferred means of
accessing digital services, both for consuming and creating content. Unfortunately, securing …

Secure key agreement and key protection for mobile device user authentication

L Wu, J Wang, KKR Choo, D He - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As mobile devices ownership becomes more prevalent (eg, a user owns multiple mobile
devices), the capability to offer secure and user friendly authentication becomes increasingly …