Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Eiji HayashiJason I. HongNicolas ChristinPublished in: SOUPS (2009)
Keyphrases
- countermeasures
- information security
- user authentication
- rural areas
- cyber attacks
- key agreement
- security requirements
- power analysis
- computer security
- information systems
- graphical password
- security measures
- java card
- network security
- authentication protocol
- security analysis
- authentication scheme
- smart grid
- security mechanisms
- intrusion detection
- database