The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2008 vol. 6)
ISSN: 1540-7993
pp: 36-43
Thomas Weigold , IBM's Zurich Research Laboratory
Thorsten Kramp , IBM's Zurich Research Laboratory
Michael Baentsch , IBM's Zurich Research Laboratory
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.
remote authentication, computer security, phishing, man-in-the-middle attacks

T. Kramp, T. Weigold and M. Baentsch, "Remote Client Authentication," in IEEE Security & Privacy, vol. 6, no. , pp. 36-43, 2008.
85 ms
(Ver 3.3 (11022016))