Fighting Coercion Attacks in Key Generation using Skin Conductance

Abstract

Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in… (More)

Topics

15 Figures and Tables

Slides referencing similar topics