Design Considerations for Secure and Usable Authentication on Situated Displays.
Ludwig TrotterSarah PrangeMohamed KhamisNigel DaviesFlorian AltPublished in: MUM (2018)
Keyphrases
- design considerations
- user authentication
- authentication mechanism
- authentication scheme
- password authentication
- authentication protocol
- data encryption
- security mechanisms
- identity management
- security analysis
- factor authentication
- security requirements
- integrity verification
- key distribution
- secure manner
- security services
- secure communication
- key agreement
- public key cryptography
- smart card
- access control
- mutual authentication
- key exchange protocol
- secret key
- security properties
- rights management
- key agreement protocol
- trusted third party
- encryption decryption
- public key
- security issues
- biometric authentication
- digital signature
- resource constrained
- random access memory
- information security
- electronic payment
- trusted platform module
- e learning
- public key encryption
- graphical password
- public key infrastructure
- low voltage
- standard model
- key management
- pedagogical agents
- cloud computing
- mobile devices
- multimedia