Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1016/j.procs.2020.04.119
|View full text |Cite
|
Sign up to set email alerts
|

PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Sensitive client information is always protected from all types of assault, including phishing and man-in-the-middle attacks. Due to the present mobile authentication mechanisms, it is more difficult for users with mobile devices to recognise and prevent phishing attacks [11]. A mobile app prototype for e-voting with three levels of security has been created.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Sensitive client information is always protected from all types of assault, including phishing and man-in-the-middle attacks. Due to the present mobile authentication mechanisms, it is more difficult for users with mobile devices to recognise and prevent phishing attacks [11]. A mobile app prototype for e-voting with three levels of security has been created.…”
Section: Resultsmentioning
confidence: 99%
“…Attackers no longer bombard and spam users; instead, they use open-source intelligence (OSNT) technologies in conjunction with Internet sources to obtain minimal but required data on a target without their knowledge or consent [10]. Since phishing attacks do not contain any dangerous executable payload or malware, e-mail servers running antispam or phishing security programmes can struggle to identify phishing attempts [11].…”
Section: Mobile App Architecturementioning
confidence: 99%
“…The proposed scheme resists phishing attacks. Phishing attacks come in the form of fraudulent email messages that appear to have been sent by legitimate enterprises to access private information and to commit identity theft [22]. Proof.…”
Section: Security Analyses and Discussion On Possible Attacksmentioning
confidence: 99%
“…There is some research that has touched on how to make the transmission of instant messages secure, also most instant messaging applications have relied on the use of End-to-End Encryption, when the message is sent, the algorithm encrypts it directly so that it is transferred to the second party as an encrypted message. Some articles focus on analyzing the encryption protocol used by each of them, while applying the security features they provide, and through research it will give us the ability to choose a secure instant messaging service [3].…”
Section: Introductionmentioning
confidence: 99%