STASH: Securing transparent authentication schemes using prover-side proximity verification
Transparent authentication (TA) schemes are those in which a user's prover device authenticates him to a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. Most TA implementations rely on the received signal stren...
Main Authors: | Juuti, M, Vaas, C, Sluganovic, I, Liljestrand, H, Asokan, N, Martinovic, I |
---|---|
Format: | Conference item |
Published: |
Institute for Electrical and Electronics Engineers
2017
|
Similar Items
-
Using first-order theorem provers for security protocol verification
by: Lim, Pamela Jiah Min
Published: (2015) -
Stashing And Parallelization Pentagons
by: Vasco Brattka
Published: (2021-12-01) -
Security of mixed reality systems: authenticating users, devices, and data
by: Sluganovic, I
Published: (2018) -
The TAMARIN prover for the symbolic analysis of security protocols
by: Meier, S, et al.
Published: (2013) -
Using Reflexive Eye Movements For Fast Challenge−Response Authentication
by: Sluganovic, I, et al.
Published: (2016)