The Security of Lazy Users in Out-of-Band Authentication.
Moni NaorLior RotemGil SegevPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- security requirements
- identity authentication
- security mechanisms
- recommender systems
- data encryption
- user interaction
- end users
- information security
- graphical password
- user interface
- intrusion detection
- authentication mechanism
- encryption decryption
- fuzzy vault
- trust relationships
- key distribution
- security analysis
- security issues
- user authentication
- biometric data
- security services
- security systems
- statistical databases
- security policies
- access control