On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Tianhao WangHuangyi GeOmar ChowdhuryHemanta K. MajiNinghui LiPublished in: CCS (2016)
Keyphrases
- authentication protocol
- smart card
- security protocols
- cryptographic protocols
- security analysis
- security properties
- public key
- security requirements
- ban logic
- hash functions
- fuzzy vault
- user authentication
- security mechanisms
- information security
- key management
- digital signature
- public key cryptography
- encryption scheme
- secret key
- rfid systems
- lightweight
- rfid tags
- secure communication
- security issues
- key distribution
- sensitive data
- security problems
- session key
- real time
- intrusion detection system
- end to end
- software engineering