Overcoming the threat of coercion attacks in a cryptographic system has been a top priority for system designers since the birth of cyber-security. One way to overcome such a threat is to leverage implicit memory to construct a defense against rubber-hose attacks where the users themselves do not possess conscious knowledge of the trained password. We propose NeuroCrypt, a coercion-resistant authentication system that uses an improved version of the Serial Interception Sequence Learning task, employing additional auditory and haptic modalities backed by concepts borrowed from cognitive psychology. We carefully modify the visual stimuli as well as add auditory and haptic stimuli to improve the implicit learning process, resulting in faster t...
Internet hacking has become common now a days and is increasing day by day. It is a high time to saf...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
Current text-based authentication systems cannot withstand situations where the user is forced to re...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 I...
User authentication involves establishing a user's right to access a system. Most user authenticatio...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
People struggle to invent safe passwords for many of their typical online activities, leading to a v...
A wide variety of systems, ubiquitous in our dailyactivities, require personal identification scheme...
All current forms of authentication are exploitable via social engineering, theft, hacking, or repli...
This paper deals with the access control problem. We assume that valuable resources need to be prote...
In a recent JMIR article, El Emam, Moreau and Jonker highlight the importance of using strong passwo...
Internet hacking has become common now a days and is increasing day by day. It is a high time to saf...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
Current text-based authentication systems cannot withstand situations where the user is forced to re...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 I...
User authentication involves establishing a user's right to access a system. Most user authenticatio...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
People struggle to invent safe passwords for many of their typical online activities, leading to a v...
A wide variety of systems, ubiquitous in our dailyactivities, require personal identification scheme...
All current forms of authentication are exploitable via social engineering, theft, hacking, or repli...
This paper deals with the access control problem. We assume that valuable resources need to be prote...
In a recent JMIR article, El Emam, Moreau and Jonker highlight the importance of using strong passwo...
Internet hacking has become common now a days and is increasing day by day. It is a high time to saf...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...