Issue No.04 - July/August (2008 vol.6)
Thomas Weigold , IBM's Zurich Research Laboratory
Thorsten Kramp , IBM's Zurich Research Laboratory
Michael Baentsch , IBM's Zurich Research Laboratory
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.93
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.
remote authentication, computer security, phishing, man-in-the-middle attacks
Thomas Weigold, Thorsten Kramp, Michael Baentsch, "Remote Client Authentication", IEEE Security & Privacy, vol.6, no. 4, pp. 36-43, July/August 2008, doi:10.1109/MSP.2008.93