STASH: Securing transparent authentication schemes using prover-side proximity verification
Transparent authentication (TA) schemes are those in which a user's prover device authenticates him to a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. Most TA implementations rely on the received signal stren...
Main Authors: | , , , , , |
---|---|
Format: | Conference item |
Published: |
Institute for Electrical and Electronics Engineers
2017
|