Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
A new one time password system is described which is secure against eavesdropping and server database compromise at the same time. Traditionally, these properties have proven to b...