Di Maio et al., 2021 - Google Patents
ascCAPTCHA: an Invisible Sensor CAPTCHA for PCs Based on Acoustic Side ChannelDi Maio et al., 2021
View PDF- Document ID
- 7819863219401845411
- Author
- Di Maio R
- Guerar M
- Migliardi M
- Publication year
- Publication venue
- 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO)
External Links
Snippet
Our growing reliance on the digital world has caused a similar growth in the sophistication of bots trying to impersonate humans. The most classic tool to tell human and computers apart is the CAPTCHA, however CAPTCHAs based on cognitive challenges are becoming either …
- 241000282414 Homo sapiens 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0861—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | User authentication on mobile devices: Approaches, threats and trends | |
US20210110014A1 (en) | System, Device, and Method of Determining Personal Characteristics of a User | |
Stefan et al. | Robustness of keystroke-dynamics based biometrics against synthetic forgeries | |
Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
Kambourakis et al. | Introducing touchstroke: keystroke‐based authentication system for smartphones | |
US20180349583A1 (en) | System, Device, and Method of Determining Personal Characteristics of a User | |
Hussain et al. | The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks | |
Stanciu et al. | On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks | |
Shukla et al. | Stealing passwords by observing hands movement | |
Khan et al. | A comparative evaluation of implicit authentication schemes | |
Al-Haiqi et al. | On the best sensor for keystrokes inference attack on android | |
Guerar et al. | Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
Guerar et al. | A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices | |
Wang et al. | Personal PIN leakage from wearable devices | |
Guerar et al. | Completely automated public physical test to tell computers and humans apart: A usability study on mobile devices | |
Acien et al. | BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors | |
Zhang et al. | AugAuth: Shoulder-surfing resistant authentication for augmented reality | |
Stefan et al. | Keystroke-dynamics authentication against synthetic forgeries | |
Qi et al. | Construction and mitigation of user-behavior-based covert channels on smartphones | |
Su et al. | Remote Keylogging Attacks in Multi-user {VR} Applications | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
Kroeze et al. | User authentication based on continuous touch biometrics | |
Ahmed et al. | Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks | |
Chakraborty et al. | On designing a lesser obtrusive authentication protocol to prevent machine-learning-based threats in internet of things |