Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach.
Serkan SaritasEzzeldin ShereenHenrik SandbergGyörgy DánPublished in: GameSec (2019)
Keyphrases
- security mechanisms
- security threats
- security problems
- security requirements
- security issues
- security protocols
- identity authentication
- security analysis
- biometric template
- access control
- security measures
- user authentication
- resource constrained
- security services
- computer security
- smart card
- authentication protocol
- malicious users
- security vulnerabilities
- fuzzy vault
- denial of service attacks
- semi fragile watermarking
- security risks
- biometric data
- java card
- cryptographic protocols
- security systems
- information security
- identity management
- stream cipher
- encryption decryption
- private key
- key agreement protocol
- security model
- authentication systems
- electronic payment
- sensitive data
- intrusion detection