Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Hassan Jameel AsgharShujun LiRon SteinfeldJosef PieprzykPublished in: NDSS (2013)
Keyphrases
- user authentication
- authentication protocol
- security protocols
- password guessing
- information security
- authentication scheme
- cryptographic protocols
- authentication systems
- security analysis
- remote user authentication scheme
- security mechanisms
- computer security
- security issues
- security threats
- smart card
- biometric systems
- biometric authentication
- security systems
- access control
- rfid tags
- operating system
- low cost