We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 IEEE Symposium on Security and Privacy. These authentication schemes are designed to be secure against eavesdropping attacks while relying only on human cognitive skills. They achieve authentication via challenge response protocols based on a shared secret set of pictures
A simple theoretical framework is developed to evaluate the security and usability of eavesdropping-...
In this paper we propose several cryptosystems for the protection of templates extracted from cognit...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
Classical password/PIN-based authentication methods have proven to be vulnerable to a broad range of...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge–response ...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Overcoming the threat of coercion attacks in a cryptographic system has been a top priority for syst...
International audienceUsing a secret password or a PIN (Personal Identification Number) code is a co...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
A simple theoretical framework is developed to evaluate the security and usability of eavesdropping-...
In this paper we propose several cryptosystems for the protection of templates extracted from cognit...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
Classical password/PIN-based authentication methods have proven to be vulnerable to a broad range of...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge–response ...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Overcoming the threat of coercion attacks in a cryptographic system has been a top priority for syst...
International audienceUsing a secret password or a PIN (Personal Identification Number) code is a co...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
A simple theoretical framework is developed to evaluate the security and usability of eavesdropping-...
In this paper we propose several cryptosystems for the protection of templates extracted from cognit...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...