Enhancing Security in User-Centered Authentication Using KERI.
Biagio BoiMarco De SantisChristian EspositoPublished in: PDP (2024)
Keyphrases
- user centered
- security mechanisms
- security requirements
- user authentication
- authentication mechanism
- user centered design
- authentication protocol
- design process
- security analysis
- user centric
- educational games
- multimedia databases
- virtual private network
- learning technologies
- access control
- mobile applications
- context aware
- e government
- repertory grid
- case study
- smart card
- search tools
- graphical password
- user interface