Strengthening user authentication through opportunistic cryptographic identity assertions.
Alexei CzeskisMichael DietzTadayoshi KohnoDan S. WallachDirk BalfanzPublished in: CCS (2012)
Keyphrases
- user authentication
- smart card
- remote user authentication scheme
- security analysis
- authentication scheme
- authentication protocol
- security protocols
- information security
- keystroke dynamics
- biometric authentication
- identity verification
- biometric systems
- encryption scheme
- key management
- lightweight
- hash functions
- security requirements
- secret key