Leakage Resilient Password Systems
Book Details:
Publisher: | Springer |
Series: |
Springer
|
Author: | Yingjiu Li |
Edition: | 1 |
ISBN-10: | 3319175025 |
ISBN-13: | 9783319175027 |
Pages: | 64 |
Published: | May 12 2015 |
Posted: | Mar 04 2016 |
Language: | English |
Book format: | PDF |
Book size: | 2.53 MB |
Book Description:
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.
This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis ...
Designing Systems for Capacity Optimization
Most radio systems have become so popular that the available frequency bands are able to meet only a fraction of the demand. This book gives practical solutions for optimizing efficiency of mobile radio cells....
Develop Intelligent Technical Systems of the Future
Intelligent technical systems, which combine mechanical, electrical and software engineering with control engineering and advanced mathematics, go far beyond the state of the art in mechatronics and open up fascinating perspectives. Among these systems are so-called self-optimizing systems, which are able to adapt their behavior autonomously and flexibly to changing operating conditions. Self-optimizing systems create high value for example in terms of energy and resource efficiency as well as reliability. The Collaborative Research Center 614 "Self-optimizing Concepts and Structures in Mechanical Engineering" pursued the long-term aim to open up the active paradigm of self-optimization for mechanical engineering and to enable others to dev...
2007 - 2021 © eBooks-IT.org