Selected References on SecHCI/HumanAut
- Shujun Li and Heung-Yeung (Harry) Shum, Secure
Human-Computer Identification against Peeping Attacks (SecHCI): A Survey,
eprint, 2002 (an early version has been published online in Elesevier Science's Comuter Science Preprint Archive, vol. 2003, no. 1, pp. 5-57, 2003)
- Shujun Li and Heung-Yeung (Harry) Shum, SecHCI:
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks,
Cryptology ePrint Archive, Report 2005/268 (an early version has been appeared online in Elesevier Science's Comuter Science Preprint Archive, vol. 2004, no. 3, pp. 21-69, 2004)
- Ross J. Anderson, Why cryptosystems fail,Communications of the
ACM, 37(11):32-40, 1994.
- Ross J. Anderson, Why cryptosystems fail, In Proc. 1st ACM Conf.
Computer and Communication Security (CCS¡¯93), pages 215-227, 1993.
- Rachna Dhamija and Adrian Perrig, Deja Vu: A user study using
images for authentication,. In Proc. the 9th USENIX Security Symposium,
pages 45-58, 2000, available at http://www.usenix.org/events/sec2000/dhamija.html.
- searchSecurity.com, Shoulder surfing, available online at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci802244,00.html,
Feb. 14, 2002.
- BBC News, Chinese cameras spying on spouses, available at http://news.bbc.co.uk/hi/english/
world/asia-pacific/newsid_1885000/1885218.stm, 21 March, 2002.
- Cassi Goodman, An introduction to TEMPEST, available online at http://rr.sans.org/encryption/TEMPEST.php,
April 18, 2001.
- Joe Loughry and David A. Umphress, Information leakage from optical emanations,
ACM Trans. Information and System Security, 5(3):262-289, 2002.
- Markus G. Kuhn, Optical time-domain eavesdropping risks of CRT displays,
In Proc. 2002 IEEE Sym. Security and Privacy (S&P'02), pages 1-16.
IEEE Computer Society, 2002.
- Manuel Blum and Nick Hopper, CS 827: Security and cryptography. Please
visit http://www-2.cs.cmu.edu/%7Ehopper/cs827-f01,
Fall September, 2001.
- Tsutomu Matsumoto, Human-computer cryptography: An attempt, In Proc.
ACM Conf. on Computer and Communication Security (CCS'96), pages 68¨C75.
ACM Press, 1996.
- Nicholas J. Hopper and Manuel Blum, A secure human-computer authentication
scheme, Technical Report of Carnegie Mellon University, CMU-CS-00-139,
available online at http://reports-archive.adm.cs.cmu.edu/anon/2000/abstracts/00-139.html,
May, 2000.
- Nicholas J. Hopper and Manuel Blum, Secure human identification protocols,
In Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer
Science, vol. 2248, pages 52-66. Springer-Verlag, Berlin, 2001.
- Nick Hopper, Security and complexity aspects of human interactive proofs,
presented at the First Workshop on Human Interactive Proofs (HIP), abstract
available at http://www.aladdin.cs.cmu.edu/hips/events/abs/hopper_abstract.pdf,
2002.
- James A. Haskett, Pass-algorithms: A user validation scheme based on
knowledge of secret algorithm, Communications of the ACM, 27(8):777-781,
1984.
- Sidney L. Smith, Authentication users by word association, Computers
& Security, 6(6):464-470, 1987.
- Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier, Protecting
secret keys with personal entropy, Future Generation Computer Systems,
16(4):311-318, 2000.
- G. Miller, The magic number seven plus or minus two: Some limits on your
capacity for processing information. Psychological Review, 63(1):81-96,
1956.
- David Bensinger, Human memory and the graphical password. Available
at http://www.passlogix.com/media/pdfs/bensinger.pdf,
1998.
- Rachel Rue, Eighty-six bits of memory magic. Presented at the First
Workshop on Human Interactive Proofs (HIP), abstract available at http://www.aladdin.cs.cmu.edu/hips/events/abs/rue_abstract.pdf,
2002.
- Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D.
Rubin, The design and analysis of graphical passwords, In Proc.
8th USENIX Security Symposium, pages 1-14, 1999, available at http://www.usenix.org/publications/library/proceedings/sec99/jermyn.html.
- ID Arts Inc., Passfaces - the art of identification, please visit
http://www.idarts.com,
2002.
- Amos Fiat and Adi Shamir, How to prove yourself: Practical solutions
to identification and signature problems, In Advances in Cryptology
- CRYPTO¡¯86, Lecture Notes in Computer Science, vol. 263, pages
186-194. Springer-Verlag, Berlin, 1987.
- Aviel D. Rubin, Independent one-time passwords, Computing Systems,
9(1):15-27, 1996.
- Kazukumi Kobara and Hideki Imai, Limiting the visible space visual secret
sharing schemes and their application to human identification, In Advances
in Cryptology - ASIACRYPT¡¯96, Lecture Notes in Computer Science,
vol. 1163, pages 185-195. Springer-Verlag, Berlin, 1996.
- Martina Angela Sasse, Sacha Brostoff, and Dirk Weirich, Transforming
the "weakest link" ¨C a human/computer interaction approach to usable
and effective security, BT Technology J., 19(3): 122-131, 2001.
- Maria M. King, Rebus passwords, In Proc. the 7th Annual Computer
Security Applications Conference (ACSAC'91),
pages 239-243. IEEE Press, 1991.
Note: for more details about SecHCI and more references, please read [1,2]
or contact Shujun LI.
|