Impersonation attacks on software-only two-factor authentication schemes

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.

Original languageEnglish
Pages (from-to)358-360
Number of pages3
JournalIEEE Communications Letters
Volume6
Issue number8
DOIs
Publication statusPublished - 2002 Aug

All Science Journal Classification (ASJC) codes

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Impersonation attacks on software-only two-factor authentication schemes'. Together they form a unique fingerprint.

  • Cite this