STASH: Securing transparent authentication schemes using prover-side proximity verification

Transparent authentication (TA) schemes are those in which a user's prover device authenticates him to a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. Most TA implementations rely on the received signal stren...

Full description

Bibliographic Details
Main Authors: Juuti, M, Vaas, C, Sluganovic, I, Liljestrand, H, Asokan, N, Martinovic, I
Format: Conference item
Published: Institute for Electrical and Electronics Engineers 2017