Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decryp...
Saved in:
Main Authors: | GUPTA, Payas, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1317 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Coercion Resistance in Authentication Responsibility Shifting
by: GUPTA, Payas, et al.
Published: (2012) -
I Can Be You: Questioning the Use of Keystroke Dynamics as Biometrics
by: TEY, Chee Meng, et al.
Published: (2013) -
Keystroke Timing Analysis of on-the-fly Web Apps
by: TEY, Chee Meng, et al.
Published: (2013) -
Keystroke Biometrics: The User Perspective
by: Tey, Chee Meng, et al.
Published: (2014) -
MobiPot: Understanding Mobile Telephony Threats with Honeycards
by: BALDUZZI, Marco, et al.
Published: (2016)