On the Incorporation of Haptic Effects in Security Authentication.
John PotocnySean McNultyKabir MaigaMehrdad H. ZadehPublished in: SMC (2015)
Keyphrases
- security mechanisms
- security requirements
- identity authentication
- authentication mechanism
- user authentication
- authentication protocol
- data encryption
- encryption decryption
- security issues
- security analysis
- authentication scheme
- integrity verification
- fuzzy vault
- authentication systems
- information security
- security services
- identity management
- biometric data
- factor authentication
- virtual environment
- smart card
- access control
- high security
- elliptic curve cryptography
- public key cryptography
- security systems
- high fidelity
- biometric authentication
- virtual private network
- security policies
- network management
- biometric systems
- security protocols
- security properties
- public key infrastructure
- mutual authentication
- wireless local area network
- secure communication
- security level
- computer security
- multimodal biometrics
- biometric template
- trusted computing
- statistical databases
- key agreement
- password authentication