Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1953
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBıçakcı, Kemal-
dc.contributor.authorÜnal, Devrim-
dc.contributor.authorAşcıoğlu, Nadir-
dc.contributor.authorAdalıer, Oktay-
dc.date.accessioned2019-07-10T14:42:42Z
dc.date.available2019-07-10T14:42:42Z
dc.date.issued2014-
dc.identifier.citationBicakci, K., Unal, D., Ascioglu, N., & Adalier, O. (2014). Mobile authentication secure against man-in-the-middle attacks. Procedia Computer Science, 34, 323-329.en_US
dc.identifier.issn1877-0509-
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S1877050914008862?via%3Dihub-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/1953-
dc.description9th International Conference on Future Networks and Communications(2014 : Canada)en_US
dc.description.abstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider. (c) 2014 The Authors. Published by Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherELSEVIER Science BVen_US
dc.relation.ispartofProcedia Computer Scienceen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectAuthenticationen_US
dc.subjectPhishingen_US
dc.subjectMan-In-The-Middle attacken_US
dc.subjectSecure elementen_US
dc.subjectMobile signatureen_US
dc.subjectSecurity protocolen_US
dc.titleMobile Authentication Secure Against Man-In Attacksen_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.identifier.volume34en_US
dc.identifier.startpage323en_US
dc.identifier.endpage329en_US
dc.identifier.wosWOS:000349979900039-
dc.identifier.scopus2-s2.0-84906808148-
dc.institutionauthorBıçakçı, Kemal-
dc.identifier.doi10.1016/j.procs.2014.07.031-
dc.authorscopusid6603355557-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ2-
dc.identifier.wosqualityN/A-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

11
checked on Mar 29, 2025

WEB OF SCIENCETM
Citations

11
checked on Nov 9, 2024

Page view(s)

92
checked on Mar 31, 2025

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.