2012
DOI: 10.1007/978-3-642-34129-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Mobile Proxies for Better Password Authentication

Abstract: Abstract. Traditional textual password authentication techniques have numerous well documented security and usability flaws, yet have seen near universal deployment due to their desirable efficiency properties. As a result, many users who may prefer alternative authentication approaches are forced to use passwords or PINs on a daily basis due to a lack of control over third party servers. This work explores the use of a mobile device as a proxy for password management in an attempt to improve remote password a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…MP-Auth and Phool Proof store hashed password on the servers and thus provide only O(|D|) level of security against offline dictionary attack. PIN-Audio [24] and Tapas [21] use the phone as a mobile password manager that is used to store long and random passwords. These two schemes make the offline dictionary attacks infeasible because passwords are no longer humanmemorable and a dictionary attack is not viable.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…MP-Auth and Phool Proof store hashed password on the servers and thus provide only O(|D|) level of security against offline dictionary attack. PIN-Audio [24] and Tapas [21] use the phone as a mobile password manager that is used to store long and random passwords. These two schemes make the offline dictionary attacks infeasible because passwords are no longer humanmemorable and a dictionary attack is not viable.…”
Section: Related Workmentioning
confidence: 99%
“…We aim to comply with browser security features and to remain forward-compatible, 2) FBD-WF-WF: The FBD-WF-WF mechanism utilize WiFi as a bidirectional D-C communication medium. While Bluetooth has been explored in user authentication domain in prior work (e.g., [19], [24], [20]), WiFi has received little attention so far. Ad hoc mode WiFi is a common point-to-point infrastructureless wireless channel that can be formed between a device and client terminal equipped with WiFi adaptors.…”
Section: ) Fbd-bt-btmentioning
confidence: 99%