On the Usability of Authenticity Checks for Hardware Security Tokens.
Katharina PfefferAlexandra MaiAdrian DabrowskiMatthias GusenbauerPhilipp SchindlerEdgar R. WeipplMichael FranzKatharina KrombholzPublished in: USENIX Security Symposium (2021)
Keyphrases
- random number generator
- information security
- low cost
- digital images
- access control
- hardware and software
- trusted computing
- network security
- security issues
- image processing
- hardware implementation
- user experience
- security policies
- security requirements
- security problems
- security protocols
- embedded systems
- computing power
- security level
- real time
- database systems
- usability problems
- security threats
- security analysis
- computer security
- security mechanisms
- computer systems
- rfid tags
- statistical databases
- line segments