We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical channels,and usability studies of HISPs; we follow by presenting the methodology of the research reported in this thesis. We then make a number of con...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our r...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2012.Bibliography: p. 14...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our r...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2012.Bibliography: p. 14...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
One of the main challenges in pervasive computing is how we can establish secure communication over ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
Reliable authentication requires the devices and channels involved in the process to be trustworthy;...
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our r...