Security Levels for Web Authentication using Mobile Phones
2010 (English)Conference paper (Other academic)
Mobile phones offer unique advantages for secure authentication: they are small and portable, provide multiple data transfer channels, and are nearly ubiquitous. While phones provide a flexible and capable platform, phone designs vary, and the security level of an authentication solution is influenced by the choice of channels and authentication methods. It can be a challenge to get a consistent overview of the strengths and weaknesses of the available alternatives. In this paper we provide a method for evaluating and designing authentication solutions using mobile phones. The method also considers availability and usability, which are often overlooked factors. The goal is to help developers to create secure authentication, considering the user's priorities on security, availability and usability.
Place, publisher, year, edition, pages
Authentication, information security, mobile phones
IdentifiersURN: urn:nbn:se:liu:diva-75056OAI: oai:DiVA.org:liu-75056DiVA: diva2:503355
PrimeLife/IFIP Summer School 2010 Pre-proceedings