Using Hamiltonian Totems as Passwords
نویسندگان
چکیده
Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords are subject to brute force and shoulder surfing attacks, while users are reluctant to use biometrics for identification, due to its intrusiveness. This paper uses Hamiltonian tokens as authentication means. The proposed token structure offers many possible configurations (i.e., passwords) and is small enough to be carried on a physical keychain. After presenting our general idea, we describe an efficient algorithm to produce these tokens. Our procedure was validated by running a recognition campaign on a wide batch of synthetic samples, and experimented on prototypes manufactured using a commercial 3D-printer.
منابع مشابه
لبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملSensitivity Analysis of Fiber-Reinforced Lamina Micro-Electro-Mechanical Switches with Nonlinear Vibration Using a Higher Order Hamiltonian Approach
In this paper, the nonlinear free vibration of fiber-reinforced lamina micro-switches is investigated, and a sensitivity analysis (SA) is given. The switches are modeled as solid rectangular beams consisting of an isotropic matrix with transversely and longitudinally isotropic reinforcements, incorporating a higher order Hamiltonian approach. An SA of the proposed micro-switch is presented by c...
متن کاملepl draft The weak password problem : chaos , criticality , and encrypted p - CAPTCHAs
Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design an algorithm that strengthens security of passwords. The core idea of our method is ...
متن کاملSymmetry group, Hamiltonian equations and conservation laws of general three-dimensional anisotropic non-linear sourceless heat transfer equation
In this paper Lie point symmetries, Hamiltonian equations and conservation laws of general three-dimensional anisotropic non-linear sourceless heat transfer equation are investigated. First of all Lie symmetries are obtained by using the general method based on invariance condition of a system of differential equations under a prolonged vector field. Then the structure of symmetry ...
متن کاملText, Talk and Totems: the Discursive Constitution of the Strategy Process
Text, Talk and Totems: The Discursive Constitution of the Strategy Process The efficacy of processual analysis in the study of micro-strategizing is well established. In this paper we will seek to contribute to the strategy as process debate by introducing a discourse perspective. We will argue that such an approach offers an analytically fruitful means of studying the way in which strategies a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013