Issue No. 04 - July/August (2008 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.93
Thomas Weigold , IBM's Zurich Research Laboratory
Thorsten Kramp , IBM's Zurich Research Laboratory
Michael Baentsch , IBM's Zurich Research Laboratory
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.
remote authentication, computer security, phishing, man-in-the-middle attacks
Thomas Weigold, Thorsten Kramp, Michael Baentsch, "Remote Client Authentication", IEEE Security & Privacy, vol. 6, no. , pp. 36-43, July/August 2008, doi:10.1109/MSP.2008.93