New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Busin...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
In a typical roaming scenario the accounting information received from the roaming partner is expect...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
New families of protocol based on communication over human-based side channels, permit secure pairin...
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our r...
A fundamental part of many authentication protocols which authenticate a party to a human involves t...
A new family of protocols, based on communication over human-based side channels, permit secure pair...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract—Security needs to be human-centric if the human context and intent have to be known. Securi...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
In a typical roaming scenario the accounting information received from the roaming partner is expect...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
New families of protocol based on communication over human-based side channels, permit secure pairin...
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our r...
A fundamental part of many authentication protocols which authenticate a party to a human involves t...
A new family of protocols, based on communication over human-based side channels, permit secure pair...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract—Security needs to be human-centric if the human context and intent have to be known. Securi...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
In a typical roaming scenario the accounting information received from the roaming partner is expect...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...