2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.96
|View full text |Cite
|
Sign up to set email alerts
|

QR-TAN: Secure Mobile Transaction Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(32 citation statements)
references
References 10 publications
0
31
0
1
Order By: Relevance
“…Starnberger et al [27] describe QR-TAN, a transaction authentication method based on QR codes and a trusted mobile device. In QR-TAN, a shared secret key must be pre-arranged between the mobile device and the server.…”
Section: Sms-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Starnberger et al [27] describe QR-TAN, a transaction authentication method based on QR codes and a trusted mobile device. In QR-TAN, a shared secret key must be pre-arranged between the mobile device and the server.…”
Section: Sms-basedmentioning
confidence: 99%
“…Mulliner et al [22] have contented that SMS OTP schemes cannot be considered to be secure, as researchers have shown several successful attacks against Global System for Mobile Communications (GSM) and 3G networks [1,12,19]. Furthermore, it has been argued that two, or three, factor authentication does not overcome man-in-the-middle and Trojan attacks [10,26,27]. This paper investigates the challenging problem of user authentication and transaction verification on an untrusted computer or device.…”
Section: Introductionmentioning
confidence: 99%
“…There were similar solutions [128], but few which combined the benefits of using a mobile phone (instead of a dedicated device) with the simplicity of optical authentication, which allowed for strong challenge-response solutions without the user needing to type information into the phone. Now, it is more common for a user to rely on their smartphone for most of their Web usage, either in the phone browser or in an app.…”
Section: Web Authentication In a Mobile Worldmentioning
confidence: 99%
“…Function patterns consist of finder, timing and alignment patterns which does not encode any data. The symbol is surrounded on all the four sides by a quiet zone border [7]. A QR Code can be read even if it is tilted or distorted.…”
Section: Literature Surveymentioning
confidence: 99%