N-Auth: Mobile authentication done right

Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    5 Citations (Scopus)

    Abstract

    Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

    Original languageEnglish
    Title of host publicationACSAC 2017
    Subtitle of host publicationProceedings of the 33rd Annual Computer Security Applications Conference
    PublisherAssociation for Computing Machinery ACM
    Pages1-15
    ISBN (Print)978-1-4503-5345-8
    DOIs
    Publication statusPublished - 4 Dec 2017
    MoE publication typeA4 Article in a conference publication
    Event33rd Annual Computer Security Applications Conference, ACSAC 2017 - Orlando, United States
    Duration: 4 Dec 20178 Dec 2017

    Conference

    Conference33rd Annual Computer Security Applications Conference, ACSAC 2017
    Country/TerritoryUnited States
    CityOrlando
    Period4/12/178/12/17

    Fingerprint

    Dive into the research topics of 'N-Auth: Mobile authentication done right'. Together they form a unique fingerprint.

    Cite this