Secure pattern-based authentication against shoulder surfing attack in smart devices.
Hyungjune ShinDaeyoung KimJunbeom HurPublished in: ICUFN (2015)
Keyphrases
- smart devices
- authentication mechanism
- authentication protocol
- data encryption
- embedded devices
- daily life
- ubiquitous computing
- user authentication
- key agreement
- secret key
- authentication scheme
- smart phones
- graphical password
- security protocols
- key distribution
- security analysis
- smart card
- factor authentication
- public key
- identity management
- diffie hellman
- key exchange protocol
- copyright protection
- security requirements
- smart environments
- elliptic curve
- security mechanisms
- lightweight
- mobile devices
- security issues
- mobile phone
- digital images