Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/12478
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bicakci, K. | - |
dc.contributor.author | Unal, D. | - |
dc.contributor.author | Ascioglu, N. | - |
dc.contributor.author | Adalier, O. | - |
dc.date.accessioned | 2025-05-10T19:33:11Z | - |
dc.date.available | 2025-05-10T19:33:11Z | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 1877-0509 | - |
dc.identifier.uri | https://doi.org/10.1016/j.procs.2014.07.031 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/12478 | - |
dc.description.abstract | Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. © 2014 The Authors. Published by Elsevier B.V. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier B.V. | en_US |
dc.relation.ispartof | Procedia Computer Science -- 9th International Conference on Future Networks and Communications, FNC 2014 and the 11th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2014 -- 17 August 2014 through 20 August 2014 -- Niagara Falls, ON -- 130208 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Authentication | en_US |
dc.subject | Man-In-The-Middle Attack | en_US |
dc.subject | Mobile Signature | en_US |
dc.subject | Phishing | en_US |
dc.subject | Secure Element | en_US |
dc.subject | Security Protocol | en_US |
dc.title | Mobile Authentication Secure Against Man-In Attacks | en_US |
dc.type | Conference Object | en_US |
dc.department | TOBB University of Economics and Technology | en_US |
dc.identifier.volume | 34 | en_US |
dc.identifier.startpage | 323 | en_US |
dc.identifier.endpage | 329 | en_US |
dc.identifier.scopus | 2-s2.0-84906808148 | - |
dc.identifier.doi | 10.1016/j.procs.2014.07.031 | - |
dc.authorscopusid | 6603355557 | - |
dc.authorscopusid | 57207703040 | - |
dc.authorscopusid | 56252592300 | - |
dc.authorscopusid | 23472255900 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | Q2 | - |
dc.identifier.wosquality | N/A | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
13
checked on Jul 5, 2025
Page view(s)
60
checked on Jul 7, 2025
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.