Skip to main content

Showing 1–1 of 1 results for author: Udar, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1505.05779  [pdf, ps, other

    cs.CR

    Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

    Authors: O. Huhta, P. Shrestha, S. Udar, M. Juuti, N. Saxena, N. Asokan

    Abstract: Deauthentication is an important component of any authentication system. The widespread use of computing devices in daily life has underscored the need for zero-effort deauthentication schemes. However, the quest for eliminating user effort may lead to hidden security flaws in the authentication schemes. As a case in point, we investigate a prominent zero-effort deauthentication scheme, called ZEB… ▽ More

    Submitted 14 February, 2016; v1 submitted 21 May, 2015; originally announced May 2015.

    ACM Class: K.6.5