Photographic Authentication through Untrusted Terminals

  title={Photographic Authentication through Untrusted Terminals},
  author={Trevor Pering and Murali Sundar and John Light and Roy Want},
  journal={IEEE Pervasive Computing},
P ublic Internet access points provide a convenient means to access the Internet, but they pose considerable security risks. For example, an unscrupulous attacker could modify a public system to capture all of a user's keystrokes using devices such as the Key Katcher. 1 One way to enhance security on such terminals is through photographic authentication, a technique that relies on personal photographs for authenticating user access. The photographic-authentication prototype described in this… CONTINUE READING
Highly Cited
This paper has 63 citations. REVIEW CITATIONS
41 Citations
2 References
Similar Papers


Publications citing this paper.

63 Citations

Citations per Year
Semantic Scholar estimates that this publication has 63 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.

Similar Papers

Loading similar papers…