Fighting Coercion Attacks in Key Generation using Skin Conductance


Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in… (More)


15 Figures and Tables

Slides referencing similar topics