Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Hassan KhanUrs HengartnerDaniel VogelPublished in: SOUPS (2015)
Keyphrases
- security mechanisms
- security requirements
- authentication mechanism
- integrity verification
- data encryption
- user authentication
- authentication protocol
- security analysis
- factor authentication
- security issues
- security services
- key agreement
- password authentication
- key distribution
- identity management
- private key
- authentication scheme
- encryption decryption
- key agreement protocol
- security properties
- access control
- public key
- smart card
- identity authentication
- security protocols
- key management
- information security
- public key cryptography
- security measures
- resource constrained
- key exchange protocol
- electronic payment
- security level
- mutual authentication
- secure communication
- public key infrastructure
- security model
- authentication systems
- security systems
- high security
- security policies
- security patterns
- public key encryption
- biometric data
- data security
- rights management
- ban logic
- digital signature
- elliptic curve
- diffie hellman
- security management
- trusted computing
- trusted platform module
- rfid tags
- session key
- payment systems
- sensitive data
- secret sharing scheme
- trust relationships
- privacy preserving
- intrusion detection