Skip to main content

Seeing-is-believing: Using camera phones for human-verifiable authentication

Publication ,  Conference
McCune, JM; Perrig, A; Reiter, MK
Published in: Proceedings - IEEE Symposium on Security and Privacy
November 10, 2005

Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that utilizes 2D barcodes and cameraphones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home. © 2005 IEEE.

Duke Scholars

Published In

Proceedings - IEEE Symposium on Security and Privacy

ISSN

1081-6011

Publication Date

November 10, 2005

Start / End Page

110 / 124
 

Citation

APA
Chicago
ICMJE
MLA
NLM
McCune, J. M., Perrig, A., & Reiter, M. K. (2005). Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proceedings - IEEE Symposium on Security and Privacy (pp. 110–124).
McCune, J. M., A. Perrig, and M. K. Reiter. “Seeing-is-believing: Using camera phones for human-verifiable authentication.” In Proceedings - IEEE Symposium on Security and Privacy, 110–24, 2005.
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110–24.
McCune, J. M., et al. “Seeing-is-believing: Using camera phones for human-verifiable authentication.” Proceedings - IEEE Symposium on Security and Privacy, 2005, pp. 110–24.
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110–124.

Published In

Proceedings - IEEE Symposium on Security and Privacy

ISSN

1081-6011

Publication Date

November 10, 2005

Start / End Page

110 / 124