[go: up one dir, main page]

Di Maio et al., 2021 - Google Patents

ascCAPTCHA: an Invisible Sensor CAPTCHA for PCs Based on Acoustic Side Channel

Di Maio et al., 2021

View PDF
Document ID
7819863219401845411
Author
Di Maio R
Guerar M
Migliardi M
Publication year
Publication venue
2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO)

External Links

Snippet

Our growing reliance on the digital world has caused a similar growth in the sophistication of bots trying to impersonate humans. The most classic tool to tell human and computers apart is the CAPTCHA, however CAPTCHAs based on cognitive challenges are becoming either …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Wang et al. User authentication on mobile devices: Approaches, threats and trends
US20210110014A1 (en) System, Device, and Method of Determining Personal Characteristics of a User
Stefan et al. Robustness of keystroke-dynamics based biometrics against synthetic forgeries
Meng et al. Surveying the development of biometric user authentication on mobile phones
Kambourakis et al. Introducing touchstroke: keystroke‐based authentication system for smartphones
US20180349583A1 (en) System, Device, and Method of Determining Personal Characteristics of a User
Hussain et al. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
Stanciu et al. On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
Shukla et al. Stealing passwords by observing hands movement
Khan et al. A comparative evaluation of implicit authentication schemes
Al-Haiqi et al. On the best sensor for keystrokes inference attack on android
Guerar et al. Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT
Mayrhofer et al. Adversary models for mobile device authentication
Guerar et al. A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices
Wang et al. Personal PIN leakage from wearable devices
Guerar et al. Completely automated public physical test to tell computers and humans apart: A usability study on mobile devices
Acien et al. BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors
Zhang et al. AugAuth: Shoulder-surfing resistant authentication for augmented reality
Stefan et al. Keystroke-dynamics authentication against synthetic forgeries
Qi et al. Construction and mitigation of user-behavior-based covert channels on smartphones
Su et al. Remote Keylogging Attacks in Multi-user {VR} Applications
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Kroeze et al. User authentication based on continuous touch biometrics
Ahmed et al. Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
Chakraborty et al. On designing a lesser obtrusive authentication protocol to prevent machine-learning-based threats in internet of things