Back to Results
First PageMeta Content
Mental processes / Computer network security / Access control / Authentication / Notary / Packaging / Password / Challenge-response authentication / Security token / Mind / Cognitive science / Security


Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Hristo Bojinov Daniel Sanchez, Paul Reber Stanford University Northwestern University
Add to Reading List

Document Date: 2015-04-21 17:34:34


Open Document

File Size: 517,86 KB

Share Result on Facebook

Company

Amazon / /

Currency

USD / /

Event

Product Issues / Product Recall / /

IndustryTerm

basic authentication protocol / remote server / authentication server / authentication systems / So-called rubber hose attacks / power-law decay curves / coercion-resistant security systems / rubber hose cryptanalysis / web browser / coercion-resistant authentication protocol / rubber hose attacks / electronics / information processing characteristics / security systems / memory systems / cryptographic protocol / challenge-response protocol / online applet / challenge-response protocols / coercion-resistant user authentication systems / /

MarketIndex

set 30 / /

Organization

Stanford University / Northwestern University / /

Person

Paul Reber / /

Position

guard / straight-forward / player / /

Product

Mechanical Turk / An authentication mechanism / Mechanical Turk platform / /

Technology

Neuroscience / challenge-response protocol / Cryptography / basic authentication protocol / cryptographic protocol / coercion-resistant authentication protocol / challenge-response protocols / secret key / Flash / /

URL

www.brainauth.com / /

SocialTag