The Security of Lazy Users in Out-of-Band Authentication

Lior Rotem
Lior Rotem

IACR Cryptology ePrint Archive, Volume 2018, 2018.

Cited by: 5|Bibtex|Views13|Links
EI

Abstract:

Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on “out-of-band” authentication, assuming that users have access to an external channel for authenticating one short value. For example, assuming that users recognizing each other’s voice can authenticate a short value, Telegram and WhatApp ask their users...More

Code:

Data:

Your rating :
0

 

Tags
Comments