Off-Path Hacking: The Illusion of Challenge-Response Authentication.
Yossi GiladAmir HerzbergHaya ShulmanPublished in: IEEE Secur. Priv. (2014)
Keyphrases
- shortest path
- security analysis
- security mechanisms
- visual perception
- security threats
- computer generated
- identity authentication
- search engine
- social networks
- intelligence and security informatics
- optimal path
- factor authentication
- biometric authentication
- user authentication
- real time
- endpoints
- website
- neural network
- data sets