Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
Alexander GallegoNitesh SaxenaJonathan VorisPublished in: CoRR (2010)
Keyphrases
- ad hoc networks
- key management
- secure routing
- computer games
- video games
- key management scheme
- secure communication
- interactive narrative
- key distribution
- security protocols
- security services
- mobile games
- key establishment
- security requirements
- provably secure
- diffie hellman
- security issues
- game playing
- past experience
- game theory
- role playing game
- security level
- security properties
- game design
- multimedia
- security model
- security measures
- key exchange
- access control
- virtual world
- key exchange protocol
- network security
- data encryption
- educational games
- security mechanisms
- identity management
- read write
- cryptographic protocols
- application level
- security policies
- encryption scheme
- security analysis
- digital rights management
- key agreement protocol
- stream cipher
- data security
- electronic voting
- authentication mechanism
- learning experience
- integrity verification