Authentication Against a Myopic Adversary.
Allison BeemerEric GravesJörg KliewerOliver KosutPaul L. YuPublished in: CoRR (2020)
Keyphrases
- information gain
- biometric authentication
- user authentication
- authentication protocol
- authentication scheme
- authentication mechanism
- infinite horizon
- keystroke dynamics
- identity authentication
- image authentication
- factor authentication
- data encryption
- security analysis
- decision making
- identity management
- multimodal biometrics
- bounded rationality
- security mechanisms
- security requirements
- optimal policy
- stackelberg game
- integrity verification
- cloud computing