I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.
Graeme JenkinsonMax SpencerChris WarringtonFrank StajanoPublished in: Security Protocols Workshop (2014)
Keyphrases
- security mechanisms
- key agreement
- security issues
- security threats
- security problems
- security requirements
- cryptographic algorithms
- biometric template
- security protocols
- sql injection
- access control
- security properties
- resource constrained
- security systems
- graphical password
- security services
- cryptographic protocols
- security measures
- computer security
- information security
- security vulnerabilities
- authentication protocol
- smart card
- java card
- biometric data
- key agreement protocol
- authentication mechanism
- security risks
- cyber attacks
- identity authentication
- fuzzy vault
- data encryption
- factor authentication
- user authentication
- protection scheme
- countermeasures
- integrity verification
- virtual private network
- security analysis
- protection schemes
- operating system
- chosen plaintext
- denial of service attacks
- authentication scheme
- elliptic curve
- static analysis
- security policies
- network security
- identity management
- biometric authentication
- public key cryptography
- provably secure
- anti virus
- detect malicious
- intrusion detection system