Visual Authentication and Identification

@inproceedings{Naor1997VisualAA,
  title={Visual Authentication and Identification},
  author={Moni Naor and Benny Pinkas},
  booktitle={IACR Cryptology ePrint Archive},
  year={1997}
}
The problems of authentication and identi cation have received wide interest in cryptographic research. However, there has been no satisfactory solution for the problem of authentication by a human recipient who does not use any trusted computational device. The problem of authentication arises for example in the context of smartcard{human interaction, in particular in the context of electronic wallets. The problem of identi cation is ubiquitous in communication over insecure networks. This… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 185 CITATIONS, ESTIMATED 22% COVERAGE

FILTER CITATIONS BY YEAR

1997
2018

CITATION STATISTICS

  • 15 Highly Influenced Citations

  • Averaged 11 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

Visual Cryptography, Eurocrypt '94

  • M Naor, A. Shamir
  • 1995
Highly Influential
4 Excerpts

Independent one-time passwords, Computing Systems

  • A D.Rubin
  • The USENIX Association,
  • 1996
1 Excerpt

Smartcards in hostile environments

  • H. Gobio, S. Smith, J D.Tygar, B Yee
  • Proceedings of The Second USENIX Workshop on…
  • 1996
1 Excerpt

Colorful Cryptography { a purely physical secret-sharing scheme based on chromatic lters, in Coding and Information Integrity, French-Israeli workshop

  • D. Naccache
  • 1994
1 Excerpt

Similar Papers

Loading similar papers…