Sweet-spotting security and usability for intelligent graphical authentication mechanisms.
Marios BelkAndreas PamborisChristos FidasChristina P. KatsiniNikolaos M. AvourisGeorge SamarasPublished in: WI (2017)
Keyphrases
- security mechanisms
- security services
- security requirements
- security issues
- access control
- identity authentication
- authentication mechanism
- resource constrained
- user authentication
- security analysis
- data encryption
- security systems
- authentication protocol
- smart card
- fuzzy vault
- integrity verification
- biometric data
- defense mechanisms
- authentication scheme
- encryption decryption
- authentication systems
- industrial automation
- information security
- factor authentication
- virtual private network
- security protocols
- identity based cryptography
- situational awareness
- biometric authentication
- public key cryptography
- security properties
- user experience
- identity management
- security policies
- key agreement protocol
- network access
- cloud computing
- security model
- wireless local area network
- biometric template
- payment systems
- statistical databases
- computer security
- digital signature
- trust negotiation
- high security
- secure communication
- rfid tags
- wireless sensor networks
- key agreement
- intrusion detection
- private key
- public key
- intelligent systems