메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Breaking undercover: Exploiting design flaws and nonuniform human behavior

Author keywords

audio channel; intersection attack; observation attack; passwords; tactile device; timing attack; undercover

Indexed keywords

AUDIO CHANNELS; OBSERVATION ATTACK; PASSWORDS; TACTILE DEVICE; TIMING ATTACKS; UNDERCOVER;

EID: 84862945377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2078827.2078834     Document Type: Conference Paper
Times cited : (12)

References (49)
  • 2
    • 54249122575 scopus 로고    scopus 로고
    • User identification based on handwritten signatures with haptic information
    • Haptics: Perception, Devices and Scenarios, 6th International Conference, EuroHaptics 2008, Proceedings, Springer
    • F. A. Alsulaiman, J. Cha and A. El Saddik. User identification based on handwritten signatures with haptic information. In Haptics: Perception, Devices and Scenarios, 6th International Conference, EuroHaptics 2008, Proceedings, Volume 5024 of Lecture Notes in Computer Science, 114-121, Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5024 , pp. 114-121
    • Alsulaiman, F.A.1    Cha, J.2    El Saddik, A.3
  • 3
  • 4
    • 85037151582 scopus 로고    scopus 로고
    • Cryptanalysis of the Convex Hull Click human identification protocol
    • Information Security, 13th International Conference, ISC 2010, Revised Selected Papers, Springer
    • H. J. Asghar, S. Li, J. Pieprzyk and H. Wang. Cryptanalysis of the Convex Hull Click human identification protocol. In Information Security, 13th International Conference, ISC 2010, Revised Selected Papers, Volume 6531 of Lecture Notes in Computer Science, 24-30, Springer, 2011.
    • (2011) Lecture Notes in Computer Science , vol.6531 , pp. 24-30
    • Asghar, H.J.1    Li, S.2    Pieprzyk, J.3    Wang, H.4
  • 5
    • 79251568392 scopus 로고    scopus 로고
    • A new human identification protocol and Coppersmith's baby-step giant-step algorithm
    • Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Proceedings, Springer
    • H. J. Asghar, J. Pieprzyk and H. Wang. A new human identification protocol and Coppersmith's baby-step giant-step algorithm. In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Proceedings, Volume 6123 of Lecture Notes in Computer Science, 349-366, Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6123 , pp. 349-366
    • Asghar, H.J.1    Pieprzyk, J.2    Wang, H.3
  • 15
    • 70350726610 scopus 로고    scopus 로고
    • Accessible authentication via tactile pin entry
    • T. Deyle and V. Roth. Accessible authentication via tactile pin entry. Computer Graphics Topics, Issue 3, 2006. http://www.zgdv.de/PDFs/topics/2006/ topics3-2006.pdf.
    • (2006) Computer Graphics Topics , Issue.3
    • Deyle, T.1    Roth, V.2
  • 23
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - ASIACRYPT 2001, Springer
    • N. J. Hopper and M. Blum. Secure human identification protocols. In Advances in Cryptology - ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science, 52-66, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 25
    • 77950846494 scopus 로고    scopus 로고
    • Human Identification through image evaluation using secret predicates
    • Topics in Cryptology - CT-RSA 2007
    • H. Jameel, R. Shaikh, H. Lee and S. Lee. Human Identification through image evaluation using secret predicates. In Topics in Cryptology - CT-RSA 2007, Volume 4377 of Lecture Notes in Computer Science, 67-84, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4377 , pp. 67-84
    • Jameel, H.1    Shaikh, R.2    Lee, H.3    Lee, S.4
  • 26
    • 70350647479 scopus 로고    scopus 로고
    • Image-feature based human identification protocols on limited display devices
    • Information Security Applications, 9th International Workshop, WISA 2008, Revised Selected Papers, Springer
    • H. Jameel, R. Shaikh, L. Hung, Y. Wei, S, Raazi, N. Canh, S. Lee, H. Lee, Y. Son and M. Fernandes. Image-feature based human identification protocols on limited display devices. In Information Security Applications, 9th International Workshop, WISA 2008, Revised Selected Papers, Volume 5379 of Lecture Notes in Computer Science, 211-224, Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5379 , pp. 211-224
    • Jameel, H.1    Shaikh, R.2    Hung, L.3    Wei, Y.4    Raazi, S.5    Canh, N.6    Lee, S.7    Lee, H.8    Son, Y.9    Fernandes, M.10
  • 34
    • 33751034055 scopus 로고    scopus 로고
    • Secure Human-Computer Identification (Interface) systems against peeping attacks: SecHCI
    • ePrint Archive: Report 2005/268
    • S. Li and H.-Y. Shum. Secure Human-Computer Identification (Interface) systems against peeping attacks: SecHCI. IACR's Cryptology ePrint Archive: Report 2005/268, 2005.
    • (2005) IACR's Cryptology
    • Li, S.1    Shum, H.-Y.2
  • 35
    • 0042044284 scopus 로고    scopus 로고
    • Practical human-machine identification over insecure channels
    • X.-Y. Li and S.-H. Teng. Practical human-machine identification over insecure channels. Journal of Combinatorial Optimization, 3(4):347-361, 1998.
    • (1998) Journal of Combinatorial Optimization , vol.3 , Issue.4 , pp. 347-361
    • Li, X.-Y.1    Teng, S.-H.2
  • 36
    • 57749106834 scopus 로고    scopus 로고
    • Novel shoulder-surfing resistant haptic-based graphical password
    • EuroHaptics Society
    • B. Malek, M. Orozco and A. El Saddik. Novel shoulder-surfing resistant haptic-based graphical password, In Proceedings of EuroHaptics'2006, 179-184, EuroHaptics Society, 2006.
    • (2006) Proceedings of EuroHaptics'2006 , pp. 179-184
    • Malek, B.1    Orozco, M.2    El Saddik, A.3
  • 38
    • 84995399871 scopus 로고
    • Human identification through insecure channel
    • Advances in Cryptology -EUROCRYPT'91, Springer
    • T. Matsumoto and H. Imai. Human identification through insecure channel. In Advances in Cryptology -EUROCRYPT'91, Volume 547 of Lecture Notes in Computer Science, 409-421, Springer, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 41
    • 77955322016 scopus 로고    scopus 로고
    • Shoulder-surfing safe login in a partially observable attacker model
    • Financial Cryptography and Data Security: 14th International Conference, FC 2010, Revised Selected Papers, Springer
    • T. Perković, M. Čagalj and N. Saxena. Shoulder-surfing safe login in a partially observable attacker model. In Financial Cryptography and Data Security: 14th International Conference, FC 2010, Revised Selected Papers, Volume 6052 of Lecture Notes in Computer Science, 351-358, Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6052 , pp. 351-358
    • Perković, T.1    Čagalj, M.2    Saxena, N.3
  • 46
    • 84957372142 scopus 로고
    • On the Matsumoto and Imai's human identification scheme
    • Advances in Cryptology - EUROCRYPT'95, Springer
    • C.-H. Wang, T. Hwang and J.-J. Tsai. On the Matsumoto and Imai's human identification scheme. In Advances in Cryptology - EUROCRYPT'95, Volume 921 of Lecture Notes in Computer Science, 382-392, Springer, 1995.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 382-392
    • Wang, C.-H.1    Hwang, T.2    Tsai, J.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.