Passhint: memorable and secure authentication.
Soumyadeb ChowdhuryRon PoetLewis MackenziePublished in: CHI (2014)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- password authentication
- authentication protocol
- factor authentication
- data encryption
- security mechanisms
- identity management
- integrity verification
- security requirements
- security analysis
- secure manner
- key distribution
- rights management
- public key cryptography
- security services
- secure communication
- identity authentication
- electronic payment
- smart card
- security issues
- private key
- access control
- public key encryption
- biometric authentication
- key agreement protocol
- cryptographic protocols
- key agreement
- authentication systems
- secret key
- encryption decryption
- crowd sourcing
- image authentication
- human memory
- key exchange protocol
- mutual authentication
- trusted third party
- resource constrained
- information sharing