Results 1 - 10
of
2,399
Password Authentication with Insecure Communication
, 1981
"... A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a mi ..."
Abstract
-
Cited by 548 (0 self)
- Add to MetaCart
A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a
A study of user password strategy for multiple accounts
- In Proc. CODASPY
, 2013
"... Despite advances in biometrics and other technologies, pass-words remain the most commonly used means of authentica-tion in computer systems. Users maintain different security levels for different passwords. In this study, we examine the degree of similarity among passwords of different secu-rity le ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
Despite advances in biometrics and other technologies, pass-words remain the most commonly used means of authentica-tion in computer systems. Users maintain different security levels for different passwords. In this study, we examine the degree of similarity among passwords of different secu
Influencing user password choice through peer pressure
, 2011
"... Passwords are the main means of authenticating users in most systems today. How-ever, they have been identified as a weak link to the overall security of many sys-tems and much research has been done in order to enhance their security and usabil-ity. Although, many schemes have been proposed, users ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Passwords are the main means of authenticating users in most systems today. How-ever, they have been identified as a weak link to the overall security of many sys-tems and much research has been done in order to enhance their security and usabil-ity. Although, many schemes have been proposed, users
Analyzing user passwords selection behavior for reduction of password space
- In Proc. IEEE Int. Carnahan Conference on Security Technology
, 2006
"... Abstract- This paper presents a comprehensive survey of recent literature on the topic of password dictionaries for alphanumerc and graphical user authentication approaches including some password schemas proposed by the author. After different methods used for reduction of password space are introd ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract- This paper presents a comprehensive survey of recent literature on the topic of password dictionaries for alphanumerc and graphical user authentication approaches including some password schemas proposed by the author. After different methods used for reduction of password space
USER PASSWORD GENERATION PRACTICES AND STRONG PASSWORD GUIDELINE COMPLIANCE
"... This study investigated the common password generation practices of online users. Three hundred and fifteen undergraduate and graduate college-age students completed a survey querying; internet usage demographics; the types and number of different password protected accounts maintained; actual pract ..."
Abstract
- Add to MetaCart
This study investigated the common password generation practices of online users. Three hundred and fifteen undergraduate and graduate college-age students completed a survey querying; internet usage demographics; the types and number of different password protected accounts maintained; actual
Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
- IEEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY
, 1992
"... Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenti ..."
Abstract
-
Cited by 436 (5 self)
- Add to MetaCart
Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential
A Cognitive Model for the Forensic Recovery of End-User Passwords
"... Despite the existence of a number of advanced authentication mechanisms such as twofactor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords, and these ..."
Abstract
- Add to MetaCart
Despite the existence of a number of advanced authentication mechanisms such as twofactor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords
Secure and efficient smart card based remote user password authentication scheme,”
- International Journal of Network Security,
, 2016
"... Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the sm ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated
The secure remote password protocol
- In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium
, 1998
"... This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak passphrase ..."
Abstract
-
Cited by 212 (6 self)
- Add to MetaCart
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak
Users are not the enemy
- Communications of the ACM
, 1999
"... Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authen ..."
Abstract
-
Cited by 355 (30 self)
- Add to MetaCart
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password
Results 1 - 10
of
2,399