Making graphic-based authentication secure against smudge attacks.
Emanuel von ZezschwitzAnton KoslowAlexander De LucaHeinrich HussmannPublished in: IUI (2013)
Keyphrases
- security mechanisms
- authentication scheme
- security protocols
- security issues
- security flaws
- security requirements
- authentication mechanism
- authentication protocol
- user authentication
- resource constrained
- security analysis
- access control
- cryptographic protocols
- security services
- data encryption
- integrity verification
- semi fragile watermarking
- smart card
- identity management
- countermeasures
- password authentication
- key distribution
- factor authentication
- secure routing
- stream cipher
- secure communication
- digital signature
- digital watermarking
- rights management
- security measures
- chosen plaintext
- public key infrastructure
- cryptographic algorithms
- key exchange protocol
- security policies