N-Auth: Mobile authentication done right

Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    2 Citations (Scopus)

    Abstract

    Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

    Original languageEnglish
    Title of host publicationProceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017
    PublisherAssociation for Computing Machinery ACM
    Pages1-15
    Number of pages15
    VolumePart F132521
    ISBN (Electronic)9781450353458
    DOIs
    Publication statusPublished - 4 Dec 2017
    MoE publication typeA4 Article in a conference publication
    Event33rd Annual Computer Security Applications Conference, ACSAC 2017 - Orlando, United States
    Duration: 4 Dec 20178 Dec 2017

    Conference

    Conference33rd Annual Computer Security Applications Conference, ACSAC 2017
    CountryUnited States
    CityOrlando
    Period4/12/178/12/17

    Fingerprint

    Authentication
    Mobile devices
    Data privacy
    Human computer interaction
    Application programs
    Android (operating system)
    iOS (operating system)

    Cite this

    Peeters, R., Hermans, J., Maene, P., Grenman, K., Halunen, K., & Häikiö, J. (2017). N-Auth: Mobile authentication done right. In Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017 (Vol. Part F132521, pp. 1-15). Association for Computing Machinery ACM. https://doi.org/10.1145/3134600.3134613
    Peeters, Roel ; Hermans, Jens ; Maene, Pieter ; Grenman, Katri ; Halunen, Kimmo ; Häikiö, Juha. / N-Auth : Mobile authentication done right. Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521 Association for Computing Machinery ACM, 2017. pp. 1-15
    @inproceedings{7f426646ec904517a65c2b3c72bf5ec7,
    title = "N-Auth: Mobile authentication done right",
    abstract = "Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.",
    author = "Roel Peeters and Jens Hermans and Pieter Maene and Katri Grenman and Kimmo Halunen and Juha H{\"a}iki{\"o}",
    year = "2017",
    month = "12",
    day = "4",
    doi = "10.1145/3134600.3134613",
    language = "English",
    volume = "Part F132521",
    pages = "1--15",
    booktitle = "Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017",
    publisher = "Association for Computing Machinery ACM",
    address = "United States",

    }

    Peeters, R, Hermans, J, Maene, P, Grenman, K, Halunen, K & Häikiö, J 2017, N-Auth: Mobile authentication done right. in Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. vol. Part F132521, Association for Computing Machinery ACM, pp. 1-15, 33rd Annual Computer Security Applications Conference, ACSAC 2017, Orlando, United States, 4/12/17. https://doi.org/10.1145/3134600.3134613

    N-Auth : Mobile authentication done right. / Peeters, Roel; Hermans, Jens; Maene, Pieter; Grenman, Katri; Halunen, Kimmo; Häikiö, Juha.

    Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521 Association for Computing Machinery ACM, 2017. p. 1-15.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    TY - GEN

    T1 - N-Auth

    T2 - Mobile authentication done right

    AU - Peeters, Roel

    AU - Hermans, Jens

    AU - Maene, Pieter

    AU - Grenman, Katri

    AU - Halunen, Kimmo

    AU - Häikiö, Juha

    PY - 2017/12/4

    Y1 - 2017/12/4

    N2 - Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

    AB - Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

    UR - http://www.scopus.com/inward/record.url?scp=85038961017&partnerID=8YFLogxK

    U2 - 10.1145/3134600.3134613

    DO - 10.1145/3134600.3134613

    M3 - Conference article in proceedings

    AN - SCOPUS:85038961017

    VL - Part F132521

    SP - 1

    EP - 15

    BT - Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017

    PB - Association for Computing Machinery ACM

    ER -

    Peeters R, Hermans J, Maene P, Grenman K, Halunen K, Häikiö J. N-Auth: Mobile authentication done right. In Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521. Association for Computing Machinery ACM. 2017. p. 1-15 https://doi.org/10.1145/3134600.3134613