Now showing items 1-4 of 4
How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification
(Springer Verlag, 2018)
Communication security has become an indispensable demand of smartphone users. End-to-end encryption is the key factor for providing communication security, which mainly relies on public key cryptography. The main and ...
Mobile Authentication Secure Against Man-In-The-Middle Attacks
(ELSEVIER Science BV, 2014)
Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle ...
Usability of authentication mechanisms in secure messaging applications
oday, the increasing popularity of instant messaging applications has introduced some security measures. One of these security measures is the authentication activity that users need to make. Authentication in instant ...
charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication
(SPRINGER INT Publishing AG, 2015)
Android Lock Pattern is popular as a screen lock method on mobile devices but it cannot be used directly over the Internet for user authentication. In our work, we carefully adapt Android Lock Pattern to satisfy the ...