The Security of Lazy Users in Out-of-Band Authentication

Lior Rotem
Lior Rotem

ACM Transactions on Privacy and Security, pp. 1-32, 2020.

Cited by: 5|Bibtex|Views17|Links
EI
Keywords:
End-to-end encryptioncryptographic protocolskey exchangemessaging

Abstract:

Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on “out-of-band” authentication, assuming that users have access to an external channel for authenticating one short value. For example, assuming that users recognizing each other’s voice can authenticate a short value, Telegram and WhatApp ask their users...More

Code:

Data:

Your rating :
0

 

Tags
Comments