scholarly journals Adversary Models for Mobile Device Authentication

2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
René Mayrhofer ◽  
Stephan Sigg

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have been established and are used to qualitatively compare different methods. However, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. The proposed classification of adversaries provides a strong and practical adversary model that offers a comparable and transparent classification of security properties in mobile device authentication.

2021 ◽  
Author(s):  
Sheng-Kai Chen ◽  
Jenq-Shiou Leu ◽  
Hsieh Wen-Bin ◽  
Jui-Tang Wang ◽  
Tian Song

Abstract Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication channel. In last years, many authentication schemes using password and smart card have been proposed. However, password might be revealed or forgotten and smart card might be shared, lost or stolen. In contrast, the biometrics, such as face, fingerprint or iris, have no such weakness. With the trend of mobile payment, more and more applications of mobile payment use biometrics to replace password and smart card. In this paper, we propose a biometric-based remote authentication scheme substituting biometric and mobile device bounded by user for password and smart card. This scheme is more convenient, suitable and securer than the schemes using smart cards on mobile payment environment.


Author(s):  
Luminita Moraru ◽  
Simona Moldovanu ◽  
Anjan Biswas

Today, medical image processing and analysis are highly active research fields boosted by rapid technical developments in medical imaging field. This chapter describes common procedures such as thresholding methods and clustering algorithms (both non-hierarchical and hierarchical approaches) used for digital image processing, with specific reference to brain magnetic resonance images. These techniques represent starting points for other sophisticated methods such as segmentation and classification. The results, which are an outcome of these methods, are used for classification of neurodegenerative diseases such as Alzheimer, Pick's, Huntington's or cerebral calcinosis. A number of applications together with the code listing are provided with the aim to make the subject accessible and practical. The MATLAB software will help the readers to identify and choose the best solution for a particular problem.


2017 ◽  
pp. 573-600
Author(s):  
Luminita Moraru ◽  
Simona Moldovanu ◽  
Anjan Biswas

Today, medical image processing and analysis are highly active research fields boosted by rapid technical developments in medical imaging field. This chapter describes common procedures such as thresholding methods and clustering algorithms (both non-hierarchical and hierarchical approaches) used for digital image processing, with specific reference to brain magnetic resonance images. These techniques represent starting points for other sophisticated methods such as segmentation and classification. The results, which are an outcome of these methods, are used for classification of neurodegenerative diseases such as Alzheimer, Pick's, Huntington's or cerebral calcinosis. A number of applications together with the code listing are provided with the aim to make the subject accessible and practical. The MATLAB software will help the readers to identify and choose the best solution for a particular problem.


2020 ◽  
Vol 19 (3) ◽  
pp. 697-710 ◽  
Author(s):  
Arne Brusch ◽  
Ngu Nguyen ◽  
Dominik Schurmann ◽  
Stephan Sigg ◽  
Lars Wolf

2006 ◽  
Vol 153 (2) ◽  
pp. 177-193 ◽  
Author(s):  
Ruggero Lanotte ◽  
Andrea Maggiolo-Schettini ◽  
Angelo Troina
Keyword(s):  

2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Muhammad Khurram Khan ◽  
Saru Kumari

The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.


2021 ◽  
Author(s):  
◽  
Benjamin Philip Palmer

<p>An increasing number of products are exclusively digital items, such as media files, licenses, services, or subscriptions. In many cases customers do not purchase these items directly from the originator of the product but through a reseller instead. Examples of some well known resellers include GoDaddy, the iTunes music store, and Amazon. This thesis considers the concept of provenance of digital items in reseller chains. Provenance is defined as the origin and ownership history of an item. In the context of digital items, the origin of the item refers to the supplier that created it and the ownership history establishes a chain of ownership from the supplier to the customer. While customers and suppliers are concerned with the provenance of the digital items, resellers will not want the details of the transactions they have taken part in made public. Resellers will require the provenance information to be anonymous and unlinkable to prevent third parties building up large amounts of information on the transactions of resellers. This thesis develops security mechanisms that provide customers and suppliers with assurances about the provenance of a digital item, even when the reseller is untrusted, while providing anonymity and unlinkability for resellers . The main contribution of this thesis is the design, development, and analysis of the tagged transaction protocol. A formal description of the problem and the security properties for anonymously providing provenance for digital items in reseller chains are defined. A thorough security analysis using proofs by contradiction shows the protocol fulfils the security requirements. This security analysis is supported by modelling the protocol and security requirements using Communicating Sequential Processes (CSP) and the Failures Divergences Refinement (FDR) model checker. An extended version of the tagged transaction protocol is also presented that provides revocable anonymity for resellers that try to conduct a cloning attack on the protocol. As well as an analysis of the security of the tagged transaction protocol, a performance analysis is conducted providing complexity results as well as empirical results from an implementation of the protocol.</p>


Sign in / Sign up

Export Citation Format

Share Document