Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/12478
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBicakci, K.-
dc.contributor.authorUnal, D.-
dc.contributor.authorAscioglu, N.-
dc.contributor.authorAdalier, O.-
dc.date.accessioned2025-05-10T19:33:11Z-
dc.date.available2025-05-10T19:33:11Z-
dc.date.issued2014-
dc.identifier.issn1877-0509-
dc.identifier.urihttps://doi.org/10.1016/j.procs.2014.07.031-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/12478-
dc.description.abstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. © 2014 The Authors. Published by Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.relation.ispartofProcedia Computer Science -- 9th International Conference on Future Networks and Communications, FNC 2014 and the 11th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2014 -- 17 August 2014 through 20 August 2014 -- Niagara Falls, ON -- 130208en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectAuthenticationen_US
dc.subjectMan-In-The-Middle Attacken_US
dc.subjectMobile Signatureen_US
dc.subjectPhishingen_US
dc.subjectSecure Elementen_US
dc.subjectSecurity Protocolen_US
dc.titleMobile Authentication Secure Against Man-In Attacksen_US
dc.typeConference Objecten_US
dc.departmentTOBB University of Economics and Technologyen_US
dc.identifier.volume34en_US
dc.identifier.startpage323en_US
dc.identifier.endpage329en_US
dc.identifier.scopus2-s2.0-84906808148-
dc.identifier.doi10.1016/j.procs.2014.07.031-
dc.authorscopusid6603355557-
dc.authorscopusid57207703040-
dc.authorscopusid56252592300-
dc.authorscopusid23472255900-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ2-
dc.identifier.wosqualityN/A-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.languageiso639-1en-
item.openairetypeConference Object-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

13
checked on Jul 5, 2025

Page view(s)

60
checked on Jul 7, 2025

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.