@inproceedings{f9e6293a5658453fa04da31d62c55294,
title = "On authentication factors: {"}What you can{"} and {"}how you do it{"}",
abstract = "In this paper, we discuss {"}alternatives{"} or derivations to the three well known authentication factors: {"}what you know{"} (pass-words⋯), {"}what you own{"} (id-cards⋯), {"}what you are{"} (biometrics⋯). We discuss and propose the factors {"}what you can do{"} and {"}how you do it{"} (mind biometric with behavioral approach). Inspired by statistical learning models, we propose a formal model for these two alternatives and describe a challenge response protocol based on these two factors. We illustrate the potential of the protocol with games unused for such purpose until now and discuss the advantages and drawbacks of our proposal compared to usual implementations of the three well known factors and also how they could complement each other.",
keywords = "Authentication, Coercion, Cognitive, Factors, Over-the-shoulder, Rubber-hose cryptanalysis",
author = "J{\'e}r{\^o}me Dossogne and Fr{\'e}d{\'e}ric Lafitte",
year = "2013",
doi = "10.1145/2523514.2523528",
language = "English",
isbn = "9781450324984",
series = "SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks",
pages = "70--78",
booktitle = "SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks",
note = "6th International Conference on Security of Information and Networks, SIN 2013 ; Conference date: 26-11-2013 Through 28-11-2013",
}