img

تفاصيل البطاقة الفهرسية

Impersonation attacks on software-only two-factor authentication schemes

مقال من تأليف: Kwon, Taekyoung ;

ملخص: Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.


لغة: إنجليزية