N-Auth: Mobile authentication done right

Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Abstract

Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

Original languageEnglish
Title of host publicationProceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017
PublisherAssociation for Computing Machinery ACM
Pages1-15
Number of pages15
VolumePart F132521
ISBN (Electronic)9781450353458
DOIs
Publication statusPublished - 4 Dec 2017
MoE publication typeA4 Article in a conference publication
Event33rd Annual Computer Security Applications Conference, ACSAC 2017 - Orlando, United States
Duration: 4 Dec 20178 Dec 2017

Conference

Conference33rd Annual Computer Security Applications Conference, ACSAC 2017
CountryUnited States
CityOrlando
Period4/12/178/12/17

Fingerprint

Authentication
Mobile devices
Data privacy
Human computer interaction
Application programs
Android (operating system)
iOS (operating system)

Cite this

Peeters, R., Hermans, J., Maene, P., Grenman, K., Halunen, K., & Häikiö, J. (2017). N-Auth: Mobile authentication done right. In Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017 (Vol. Part F132521, pp. 1-15). Association for Computing Machinery ACM. https://doi.org/10.1145/3134600.3134613
Peeters, Roel ; Hermans, Jens ; Maene, Pieter ; Grenman, Katri ; Halunen, Kimmo ; Häikiö, Juha. / N-Auth : Mobile authentication done right. Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521 Association for Computing Machinery ACM, 2017. pp. 1-15
@inproceedings{7f426646ec904517a65c2b3c72bf5ec7,
title = "N-Auth: Mobile authentication done right",
abstract = "Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.",
author = "Roel Peeters and Jens Hermans and Pieter Maene and Katri Grenman and Kimmo Halunen and Juha H{\"a}iki{\"o}",
year = "2017",
month = "12",
day = "4",
doi = "10.1145/3134600.3134613",
language = "English",
volume = "Part F132521",
pages = "1--15",
booktitle = "Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017",
publisher = "Association for Computing Machinery ACM",
address = "United States",

}

Peeters, R, Hermans, J, Maene, P, Grenman, K, Halunen, K & Häikiö, J 2017, N-Auth: Mobile authentication done right. in Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. vol. Part F132521, Association for Computing Machinery ACM, pp. 1-15, 33rd Annual Computer Security Applications Conference, ACSAC 2017, Orlando, United States, 4/12/17. https://doi.org/10.1145/3134600.3134613

N-Auth : Mobile authentication done right. / Peeters, Roel; Hermans, Jens; Maene, Pieter; Grenman, Katri; Halunen, Kimmo; Häikiö, Juha.

Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521 Association for Computing Machinery ACM, 2017. p. 1-15.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

TY - GEN

T1 - N-Auth

T2 - Mobile authentication done right

AU - Peeters, Roel

AU - Hermans, Jens

AU - Maene, Pieter

AU - Grenman, Katri

AU - Halunen, Kimmo

AU - Häikiö, Juha

PY - 2017/12/4

Y1 - 2017/12/4

N2 - Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

AB - Weak security, excessive personal data collection for user profiling, and a poor user experience are just a few of the many problems that mobile authentication solutions suffer from. Despite being an interesting platform, mobile devices are still not being used to their full potential for authentication. n-Auth is a firm step in unlocking the full potential of mobile devices in authentication, by improving both security and usability whilst respecting the privacy of the user. Our focus is on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience. We specified and built n-Auth, for which robust Android and iOS apps are openly available through the official stores.

UR - http://www.scopus.com/inward/record.url?scp=85038961017&partnerID=8YFLogxK

U2 - 10.1145/3134600.3134613

DO - 10.1145/3134600.3134613

M3 - Conference article in proceedings

AN - SCOPUS:85038961017

VL - Part F132521

SP - 1

EP - 15

BT - Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017

PB - Association for Computing Machinery ACM

ER -

Peeters R, Hermans J, Maene P, Grenman K, Halunen K, Häikiö J. N-Auth: Mobile authentication done right. In Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Vol. Part F132521. Association for Computing Machinery ACM. 2017. p. 1-15 https://doi.org/10.1145/3134600.3134613