Photographic authentication through untrusted terminals

As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person's ability to recognize personal photographs. The results from the authors' study demonstrate that this technique can reasonably withstand replay attacks, a common v...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE pervasive computing 2003-01, Vol.2 (1), p.30-36
Hauptverfasser: Pering, T., Sundar, M., Light, J., Want, R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person's ability to recognize personal photographs. The results from the authors' study demonstrate that this technique can reasonably withstand replay attacks, a common vulnerability of many existing techniques.
ISSN:1536-1268
1558-2590
DOI:10.1109/MPRV.2003.1186723