Use Your Illusion: secure authentication usable anywhere.
Eiji HayashiRachna DhamijaNicolas ChristinAdrian PerrigPublished in: SOUPS (2008)
Keyphrases
- authentication mechanism
- user authentication
- authentication protocol
- authentication scheme
- password authentication
- data encryption
- identity management
- factor authentication
- security mechanisms
- integrity verification
- secure manner
- security analysis
- security requirements
- key distribution
- public key cryptography
- security services
- key agreement
- encryption decryption
- secure communication
- rights management
- biometric authentication
- security issues
- smart card
- key agreement protocol
- public key
- mutual authentication
- access control
- information sharing
- secret key
- computer generated
- public key infrastructure
- identity authentication
- authentication systems
- security protocols
- key exchange protocol
- data confidentiality
- provably secure
- fragile watermarking
- cloud computing
- personal information
- electronic payment
- private key