Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Behavioural biometrics: a survey and classification
International Journal of Biometrics
Automatic edition of songs for guitar hero/Frets on fire
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
On mouse dynamics as a behavioral biometric for authentication
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Local government websites: cases of innovation and best practices in Mexico
Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times
Communications of the ACM
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Breaking an animated CAPTCHA scheme
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Use fewer instances of the letter "i": toward writing style anonymization
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Turing's Password: What Internet Cannot Leak
LICS '12 Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science
Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking a 3d-based CAPTCHA scheme
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
ICSC '12 Proceedings of the 2012 IEEE Sixth International Conference on Semantic Computing
Hi-index | 0.00 |
In this paper, we discuss "alternatives" or derivations to the three well known authentication factors: "what you know" (passwords, ...), "what you own" (id-cards, ...), "what you are" (biometrics, ...). We discuss and propose the factors "what you can do" and "how you do it" (mind biometric with behavioral approach). Inspired by statistical learning models, we propose a formal model for these two alternatives and describe a challenge response protocol based on these two factors. We illustrate the potential of the protocol with games unused for such purpose until now and discuss the advantages and drawbacks of our proposal compared to usual implementations of the three well known factors and also how they could complement each other.