When Context Is Better Than Identity: Authentication by Context Using Empirical Channels
In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this.
KeywordsSocial Network Mobile Phone Security Protocol Human Evaluation Mobile Payment
Unable to display preview. Download preview PDF.
- 1.A. Rice. A Continued Commitment to Security, http://blog.facebook.com/blog.php?post=486790652130
- 8.Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 14–21 (2002)Google Scholar
- 9.Nguyen, L.H., Roscoe, A.W.: Efficient group authentication protocol based on human interaction. In: Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA), pp. 9–33 (2006)Google Scholar