Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.
Insu OhYeunsu LeeHyeji LeeKyungroul LeeKangbin YimPublished in: IMIS (2017)
Keyphrases
- security requirements
- security mechanisms
- identity authentication
- security analysis
- security services
- data encryption
- user authentication
- authentication mechanism
- fuzzy vault
- security issues
- factor authentication
- information security
- authentication systems
- encryption decryption
- authentication protocol
- risk assessment
- smart card
- intrusion detection
- identity management
- integrity verification
- end users
- public key infrastructure
- access control
- identity based cryptography
- trusted third party
- public key cryptography
- biometric recognition
- biometric data
- authentication scheme
- security properties
- security systems
- mutual authentication
- biometric authentication
- biometric template
- security model
- key management
- public key
- security policies