On authentication factors: "What you can" and "how you do it"

Jérôme Dossogne, Frédéric Lafitte

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdragepeer review

Samenvatting

In this paper, we discuss "alternatives" or derivations to the three well known authentication factors: "what you know" (pass-words⋯), "what you own" (id-cards⋯), "what you are" (biometrics⋯). We discuss and propose the factors "what you can do" and "how you do it" (mind biometric with behavioral approach). Inspired by statistical learning models, we propose a formal model for these two alternatives and describe a challenge response protocol based on these two factors. We illustrate the potential of the protocol with games unused for such purpose until now and discuss the advantages and drawbacks of our proposal compared to usual implementations of the three well known factors and also how they could complement each other.

Originele taal-2Engels
TitelSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pagina's70-78
Aantal pagina's9
DOI's
StatusGepubliceerd - 2013
Evenement6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turkije
Duur: 26 nov. 201328 nov. 2013

Publicatie series

NaamSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Congres

Congres6th International Conference on Security of Information and Networks, SIN 2013
Land/RegioTurkije
StadAksaray
Periode26/11/1328/11/13

Vingerafdruk

Duik in de onderzoeksthema's van 'On authentication factors: "What you can" and "how you do it"'. Samen vormen ze een unieke vingerafdruk.

Citeer dit