Seeing-is-believing: Using camera phones for human-verifiable authentication
Publication
, Conference
McCune, JM; Perrig, A; Reiter, MK
Published in: Proceedings - IEEE Symposium on Security and Privacy
November 10, 2005
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that utilizes 2D barcodes and cameraphones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home. © 2005 IEEE.
Duke Scholars
Published In
Proceedings - IEEE Symposium on Security and Privacy
ISSN
1081-6011
Publication Date
November 10, 2005
Start / End Page
110 / 124
Citation
APA
Chicago
ICMJE
MLA
NLM
McCune, J. M., Perrig, A., & Reiter, M. K. (2005). Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proceedings - IEEE Symposium on Security and Privacy (pp. 110–124).
McCune, J. M., A. Perrig, and M. K. Reiter. “Seeing-is-believing: Using camera phones for human-verifiable authentication.” In Proceedings - IEEE Symposium on Security and Privacy, 110–24, 2005.
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110–24.
McCune, J. M., et al. “Seeing-is-believing: Using camera phones for human-verifiable authentication.” Proceedings - IEEE Symposium on Security and Privacy, 2005, pp. 110–24.
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110–124.
Published In
Proceedings - IEEE Symposium on Security and Privacy
ISSN
1081-6011
Publication Date
November 10, 2005
Start / End Page
110 / 124