Browsing Institute for Information Security & Privacy (IISP) by Subject "Human computation"
Now showing items 1-1 of 1
-
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
(Georgia Institute of Technology, 2017-03-10)Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols ...