Security Levels for Web Authentication using Mobile Phones
2011 (English)In: Privacy and Identity Management for Life / [ed] Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes and Ge Zhang, Boston: Springer , 2011, 130-143 p.Conference paper (Refereed)
Mobile phones offer unique advantages for secure authentication: they are small and portable, provide multiple data transfer channels, and are nearly ubiquitous. While phones provide a flexible and capable platform, phone designs vary, and the security level of an authentication solution is influenced by the choice of channels and authentication methods. It can be a challenge to get a consistent overview of the strengths and weaknesses of the available alternatives. Existing guidelines for authentication usually do not consider the specific problems in mobile phone authentication. We provide a method for evaluating and designing authentication solutions using mobile phones, using an augmented version of the Electronic Authentication Guideline.
Place, publisher, year, edition, pages
Boston: Springer , 2011. 130-143 p.
, IFIP Advances in Information and Communication Technology, ISSN 1868-4238 ; 352
Authentication, information security, mobile phone, security levels, evaluation method
IdentifiersURN: urn:nbn:se:liu:diva-70058DOI: 10.1007/978-3-642-20769-3_11ISBN: 978-3-642-20768-6OAI: oai:DiVA.org:liu-70058DiVA: diva2:435126
PrimeLife/IFIP Summer School 2010