Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC Topics: Applied Cryptography; Human Factors and Human Behaviour Recognition Techniques; Identification, Authentication and Non-Repudiation In Proceedings of the 18th International Conference on Security and Cryptography SECRYPT - Volume 1, 659-664, 2021