• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,399
Next 10 →

Password Authentication with Insecure Communication

by Leslie Lamport , 1981
"... A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a mi ..."
Abstract - Cited by 548 (0 self) - Add to MetaCart
A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a

A study of user password strategy for multiple accounts

by S M Taiabul Haque, Matthew Wright, Shannon Scielzo - In Proc. CODASPY , 2013
"... Despite advances in biometrics and other technologies, pass-words remain the most commonly used means of authentica-tion in computer systems. Users maintain different security levels for different passwords. In this study, we examine the degree of similarity among passwords of different secu-rity le ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Despite advances in biometrics and other technologies, pass-words remain the most commonly used means of authentica-tion in computer systems. Users maintain different security levels for different passwords. In this study, we examine the degree of similarity among passwords of different secu

Influencing user password choice through peer pressure

by Andreas Sotirakopoulos, C Andreas Sotirakopoulos , 2011
"... Passwords are the main means of authenticating users in most systems today. How-ever, they have been identified as a weak link to the overall security of many sys-tems and much research has been done in order to enhance their security and usabil-ity. Although, many schemes have been proposed, users ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Passwords are the main means of authenticating users in most systems today. How-ever, they have been identified as a weak link to the overall security of many sys-tems and much research has been done in order to enhance their security and usabil-ity. Although, many schemes have been proposed, users

Analyzing user passwords selection behavior for reduction of password space

by Roman V. Yampolskiy - In Proc. IEEE Int. Carnahan Conference on Security Technology , 2006
"... Abstract- This paper presents a comprehensive survey of recent literature on the topic of password dictionaries for alphanumerc and graphical user authentication approaches including some password schemas proposed by the author. After different methods used for reduction of password space are introd ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract- This paper presents a comprehensive survey of recent literature on the topic of password dictionaries for alphanumerc and graphical user authentication approaches including some password schemas proposed by the author. After different methods used for reduction of password space

USER PASSWORD GENERATION PRACTICES AND STRONG PASSWORD GUIDELINE COMPLIANCE

by Shannon Riley, Barbara S. Chaparro
"... This study investigated the common password generation practices of online users. Three hundred and fifteen undergraduate and graduate college-age students completed a survey querying; internet usage demographics; the types and number of different password protected accounts maintained; actual pract ..."
Abstract - Add to MetaCart
This study investigated the common password generation practices of online users. Three hundred and fifteen undergraduate and graduate college-age students completed a survey querying; internet usage demographics; the types and number of different password protected accounts maintained; actual

Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks

by Steven M. Bellovin, Michael Merritt - IEEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY , 1992
"... Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenti ..."
Abstract - Cited by 436 (5 self) - Add to MetaCart
Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential

A Cognitive Model for the Forensic Recovery of End-User Passwords

by Grigorios Fragkos, Theodore Tryfonas
"... Despite the existence of a number of advanced authentication mechanisms such as twofactor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords, and these ..."
Abstract - Add to MetaCart
Despite the existence of a number of advanced authentication mechanisms such as twofactor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords

Secure and efficient smart card based remote user password authentication scheme,”

by Jianghong Wei , Wenfen Liu , Xuexian Hu , Jianghong Wei - International Journal of Network Security, , 2016
"... Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the sm ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated

The secure remote password protocol

by Thomas Wu - In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium , 1998
"... This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak passphrase ..."
Abstract - Cited by 212 (6 self) - Add to MetaCart
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak

Users are not the enemy

by Anne Adams, Martina Angela Sasse - Communications of the ACM , 1999
"... Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authen ..."
Abstract - Cited by 355 (30 self) - Add to MetaCart
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password
Next 10 →
Results 1 - 10 of 2,399
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University