-
5
-
-
0018543411
-
Password security: A case history
-
Nov.
-
R. Morris and K. Thompson, "Password security: A case history," Commun. ACM. vol. 22. no. 11. pp. 594-597, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
6
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
B. L. Riddle, M. S. Miron, and J. A. Semo. "Passwords in use in a university timesharing environment," Comput. Security, vol. 8. no. 7, pp. 569-579, 1989.
-
(1989)
Comput. Security
, vol.8
, Issue.7
, pp. 569-579
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
7
-
-
0024777503
-
A survey of password mechanisms: Weaknesses and potential improvements
-
D. L. Jobusch and A. E. Oldehoeft. "A survey of password mechanisms: Weaknesses and potential improvements," Comput. Security, vol. 8. no. 8, pp. 675-689, 1989.
-
(1989)
Comput. Security
, vol.8
, Issue.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
9
-
-
0029238493
-
Improving system security via proactive password checking
-
[9| M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Comput. Security, vol. 14, no. 3, pp. 233-249. 1995.
-
(1995)
Comput. Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
10
-
-
0031373072
-
Cognitive, associative, and conventional passwords: Recall and guessing rates
-
J. Bunnell. J. Podd, R. Henderson, R. Napier, and J. Kennedy-Moffat, "Cognitive, associative, and conventional passwords: Recall and guessing rates," Comput. Security, vol. 16, no. 7, pp. 645-657, 1997.
-
(1997)
Comput. Security
, vol.16
, Issue.7
, pp. 645-657
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
11
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
S. M. Furnell, P. S. Dowland. H. M. Illingworth, and P. L. Reynolds. "Authentication and supervision: A survey of user attitudes," Comput. Security, vol. 19, no. 6, pp. 529-539, 2000.
-
(2000)
Comput. Security
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
Dowland, P.S.2
Illingworth, H.M.3
Reynolds, P.L.4
-
12
-
-
12244272072
-
Word association computer passwords: The effect of formulation techniques on recall and guessing rates
-
R. Pond, J. Podd, J. Bunnell, and R. Henderson, "Word association computer passwords: The effect of formulation techniques on recall and guessing rates," Comput. Security, vol. 19. no. 7, pp. 645-656. 2000.
-
(2000)
Comput. Security
, vol.19
, Issue.7
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
20
-
-
21244495478
-
-
"Method and apparatus for positively identifying an individual," U.S. Patent 4 720 860, Jan. 19
-
K. P. Weiss, "Method and apparatus for positively identifying an individual," U.S. Patent 4 720 860, Jan. 19, 1988.
-
(1988)
-
-
Weiss, K.P.1
-
22
-
-
0036030112
-
Impact of artificial gummy fingers on fingerprint systems
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. "Impact of artificial gummy fingers on fingerprint systems," Proc. SPIE, vol. 4677, pp. 275-289, 2002.
-
(2002)
Proc. SPIE
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
23
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems." IBM Syst. J.. vol, 40, no. 3, pp. 614-634. 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
25
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
June
-
L. Gong. M. A. Lomas, R. M. Needham, and J. H. Saltzer, "Protecting poorly chosen secrets from guessing attacks," IEEE J. Select. Areas Commun., vol. 11, pp. 648-656, June 1993.
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
27
-
-
0036685857
-
On the individuality of fingerprints
-
Aug.
-
S. Pankanti, S. Prabhakar, and A. K. Jain, "On the individuality of fingerprints," IEEE Trans. Pattern Anal. Machine Intell., vol. 24, pp. 1010-1025, Aug. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.24
, pp. 1010-1025
-
-
Pankanti, S.1
Prabhakar, S.2
Jain, A.K.3
-
29
-
-
0033706859
-
A biometric standard for information management and security
-
S. M. Matyas Jr. and J. Stapleton, "A biometric standard for information management and security," Comput. Security, vol. 19, no. 5, pp. 428-441, 2000.
-
(2000)
Comput. Security
, vol.19
, Issue.5
, pp. 428-441
-
-
Matyas Jr., S.M.1
Stapleton, J.2
-
30
-
-
9644296202
-
Biometrics: Truths and fictions
-
Aug.
-
B. Schneier. (1998, Aug.) Biometrics: Truths and fictions. Crypto-Gram [Online] Available: http://www.counterpane.com/ crypto-gram-9808.html
-
(1998)
Crypto-gram [Online]
-
-
Schneier, B.1
-
31
-
-
0031250434
-
Fingerprint matching using transformation parameter clustering
-
Oct.-Dec.
-
R. Germain, A. Califano, and S. Colville, "Fingerprint matching using transformation parameter clustering," IEEE Comput. Sci. Eng. Mag., vol. 4, pp. 42-49, Oct.-Dec. 1997.
-
(1997)
IEEE Comput. Sci. Eng. Mag.
, vol.4
, pp. 42-49
-
-
Germain, R.1
Califano, A.2
Colville, S.3
-
32
-
-
0033098544
-
Error-rate equations for the general biometric system
-
Mar.
-
J. L. Wayman, "Error-rate equations for the general biometric system," IEEE Robot. Automat. Mag., vol. 6, pp. 35-48. Mar. 1999.
-
(1999)
IEEE Robot. Automat. Mag.
, vol.6
, pp. 35-48
-
-
Wayman, J.L.1
-
35
-
-
0003602325
-
-
(Apr.). Internet Engineering Task Force. [Online]
-
R. Rivest and S. Dusse. (1992, Apr.) The MD5 Message-Digest Algorithm. Internet Engineering Task Force. [Online]. Available: http://www.ietf.org/rfc/ rfc1321.txt?number=1321
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.1
Dusse, S.2
-
36
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An authentication service for open network systems," in Proc. Winter USENIX Conf., 1988, pp. 191-201.
-
(1988)
Proc. Winter USENIX Conf.
, pp. 191-201
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
38
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12. pp. 993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
39
-
-
21244466199
-
Liberty alliance or passport?
-
June
-
J. Taschek. (2002, June) Liberty alliance or passport?. eWeek [Online]. Available: http://www.eweek.com/article2/ 0,3959,266840,00.asp
-
(2002)
eWeek [Online]
-
-
Taschek, J.1
-
41
-
-
84856043672
-
A mathematical theory of communication
-
July, Oct.
-
C. E. Shannon. (1948, July, Oct.) A mathematical theory of communication. Bell Syst. Tech. J. [Online], pp. 379-423. Available: http://cm.bell-labs.com/ cm/ms/what/shannonday/paper.html
-
(1948)
Bell Syst. Tech. J. [Online]
, pp. 379-423
-
-
Shannon, C.E.1
-
43
-
-
0003629991
-
-
U.S. Dept. Commerce, Nat. Inst. Sci. Technol. (NIST), FIPS Pub. 180-1, Apr.
-
"Secure Hash Standard," U.S. Dept. Commerce, Nat. Inst. Sci. Technol. (NIST), FIPS Pub. 180-1, Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
45
-
-
0742292799
-
Internet Security Glossary
-
Internet Engineering Task Force, May
-
R. Shirey, "Internet Security Glossary," Internet Engineering Task Force, RFC 2828, May 2000.
-
(2000)
RFC
, vol.2828
-
-
Shirey, R.1
-
46
-
-
21244437401
-
-
(Aug.). [Online]
-
User Authentication With Windows NT (2001, Aug.). [Online]. Available: http://support.microsoft.com/default. aspx?scid=kb%3ben-us%3b102 716
-
(2001)
User Authentication with Windows NT
-
-
-
49
-
-
0036487315
-
Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners
-
Feb.
-
R. Derakhshani, S. Schuckers, L. Hornak, and L. O'Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners," Pattern Recogn., vol. 36, no. 2, pp. 383-396, Feb. 2003.
-
(2003)
Pattern Recogn.
, vol.36
, Issue.2
, pp. 383-396
-
-
Derakhshani, R.1
Schuckers, S.2
Hornak, L.3
O'Gorman, L.4
-
50
-
-
0034274945
-
Automatic verbal information verification for user authentication
-
Sept.
-
Q. Li, B.-H. Juang, Q. Zhou, and C.-H. Lee, "Automatic verbal information verification for user authentication," IEEE Trans. Speech Audio Processing, vol. 8, pp. 585-596, Sept. 2000.
-
(2000)
IEEE Trans. Speech Audio Processing
, vol.8
, pp. 585-596
-
-
Li, Q.1
Juang, B.-H.2
Zhou, Q.3
Lee, C.-H.4
-
53
-
-
0033901151
-
The NIST 1999 speaker recognition evaluation - An overview
-
A. Martin and M. Przybocki, "The NIST 1999 speaker recognition evaluation - An overview." Dig. Signal Process., vol. 10, no. 1-3, pp. 1-18, 2000.
-
(2000)
Dig. Signal Process.
, vol.10
, Issue.1-3
, pp. 1-18
-
-
Martin, A.1
Przybocki, M.2
-
55
-
-
0036522407
-
FVC2000: Fingerprint Verification Competition
-
Mar.
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2000: Fingerprint Verification Competition," IEEE Trans. Pattern Anal. Machine Intell., vol. 24, pp. 402-412, Mar. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.24
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
|