The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2008 vol. 6)
ISSN: 1540-7993
pp: 36-43
Thorsten Kramp , IBM's Zurich Research Laboratory
Thomas Weigold , IBM's Zurich Research Laboratory
Michael Baentsch , IBM's Zurich Research Laboratory
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.
remote authentication, computer security, phishing, man-in-the-middle attacks
Thorsten Kramp, Thomas Weigold, Michael Baentsch, "Remote Client Authentication", IEEE Security & Privacy, vol. 6, no. , pp. 36-43, July/August 2008, doi:10.1109/MSP.2008.93
107 ms
(Ver 3.3 (11022016))