Abstract
Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.
Original language | English |
---|---|
Pages (from-to) | 358-360 |
Number of pages | 3 |
Journal | IEEE Communications Letters |
Volume | 6 |
Issue number | 8 |
DOIs | |
Publication status | Published - 2002 Aug |
All Science Journal Classification (ASJC) codes
- Modelling and Simulation
- Computer Science Applications
- Electrical and Electronic Engineering