Proceedings of the 2005 Workshop on Digital Identity Management 2005
DOI: 10.1145/1102486.1102496
|View full text |Cite
|
Sign up to set email alerts
|

Authentication using multiple communication channels

Abstract: We discuss an authentication method using multiple communication channels. This method enables on-line service providers to strongly authenticate their users on a non-trusted communication channel (e.g. using a kiosk PC in an Internet café to access the Internet) via trusted communication channels (e.g. a mobile phone network). For the illustration purpose, we use a commonly available configuration in the current marketplace, in which users access service providers through PCs over the Internet and also have m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 0 publications
0
13
0
Order By: Relevance
“…Mizuno, Yamada [24] gives us the multiple communication channels that are used to validate user identity. Mobile phones can be used as trusted communication channels.…”
Section: User Activitymentioning
confidence: 99%
“…Mizuno, Yamada [24] gives us the multiple communication channels that are used to validate user identity. Mobile phones can be used as trusted communication channels.…”
Section: User Activitymentioning
confidence: 99%
“…However, the authors show that this technique is resilient to man-in-themiddle-attacks while being still more convenient to use than manual hash verification. Mizuno et al [17] introduce a onetime password technique which enables a user to log into a web site from an untrusted PC (e.g. a kiosk PC or an Internet caf) without having to enter any private information such as a username or a password.…”
Section: Related Workmentioning
confidence: 99%
“…Though users perceive passwords to be the preferred method, there is a need to promote additional authentication methods including physiological and behavioral biometrics. As a result, researchers recommend enhancing authentication methods by utilizing multiple means of authentication to provide for better authentication verification (Mizuno, Yamada, & Takahashi, 2005;Tsalakanidou, Malassiotis, & Strintzis, 2007).…”
Section: Biometrics and Authenticationmentioning
confidence: 99%