Visible to the public n-Auth: Mobile Authentication Done Right

Titlen-Auth: Mobile Authentication Done Right
Publication TypeConference Paper
Year of Publication2017
AuthorsPeeters, Roel, Hermans, Jens, Maene, Pieter, Grenman, Katri, Halunen, Kimmo, Häikiö, Juha
Conference NameProceedings of the 33rd Annual Computer Security Applications Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5345-8
Keywordscompositionality, human factors, iOS Security, Metrics, pubcrawl, Resiliency
AbstractWeak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.
URLhttp://doi.acm.org/10.1145/3134600.3134613
DOI10.1145/3134600.3134613
Citation Keypeeters_n-auth:_2017