Adversary models for mobile device authentication
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …
mobile devices. We start by providing an overview of existing survey articles published in the …
A formal analysis of authentication protocols for mobile devices in next generation networks
M Aiash - Concurrency and Computation: Practice and …, 2015 - Wiley Online Library
Summary Next Generation Networks comprise a wide variety of access technologies such
as 2G/3G, WLAN as well as the Long‐Term Evolution (LTE) networks. In this environment …
as 2G/3G, WLAN as well as the Long‐Term Evolution (LTE) networks. In this environment …
[PDF][PDF] Extending Formal Analysis of Mobile Device Authentication.
WR Claycomb, D Shin - J. Internet Serv. Inf. Secur., 2011 - jisis.org
Authentication between mobile devices in ad-hoc computing environments is a challenging
problem. Without pre-shared knowledge, existing applications must rely on additional …
problem. Without pre-shared knowledge, existing applications must rely on additional …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Progressive authentication: deciding when to authenticate on mobile phones
Mobile users are often faced with a trade-off between security and convenience. Either users
do not use any security lock and risk compromising their data, or they use security locks but …
do not use any security lock and risk compromising their data, or they use security locks but …
UACAP: A unified auxiliary channel authentication protocol
Authenticating spontaneous interactions between devices and users is challenging for
several reasons: the wireless (and therefore invisible) nature of device communication, the …
several reasons: the wireless (and therefore invisible) nature of device communication, the …
A framework for continuous, transparent mobile device authentication
We address two distinct problems with de facto mobile device authentication, as provided by
a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis …
a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis …
An architecture for secure mobile devices
R Mayrhofer - Security and Communication Networks, 2015 - Wiley Online Library
Mobile devices such as smart phones have become one of the preferred means of
accessing digital services, both for consuming and creating content. Unfortunately, securing …
accessing digital services, both for consuming and creating content. Unfortunately, securing …
Secure key agreement and key protection for mobile device user authentication
As mobile devices ownership becomes more prevalent (eg, a user owns multiple mobile
devices), the capability to offer secure and user friendly authentication becomes increasingly …
devices), the capability to offer secure and user friendly authentication becomes increasingly …