ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts.
Jan GugenheimerAlexander De LucaHayato HessStefan KargDennis WolfEnrico RukzioPublished in: MobileHCI (2015)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- authentication protocol
- password authentication
- data encryption
- security analysis
- integrity verification
- identity management
- factor authentication
- security mechanisms
- key distribution
- security requirements
- secure manner
- security services
- rights management
- public key encryption
- key management
- smart card
- cryptographic protocols
- biometric authentication
- secure communication
- authentication systems
- key agreement
- encryption decryption
- key exchange protocol
- electronic payment
- key agreement protocol
- identity authentication
- public key cryptography
- security protocols
- private key
- personal information
- cloud computing
- public key
- electronic commerce
- access control
- sensitive data
- graphical password
- public key infrastructure
- key exchange
- diffie hellman
- digital signature
- group communication