메뉴 건너뛰기




Volumn 91, Issue 12, 2003, Pages 2021-2040

Comparing passwords, tokens, and biometrics for user authentication

Author keywords

Access control; Biometric; End user authentication; Human authentication; Identity management; Identity token; Password; Verification

Indexed keywords

DATA REDUCTION; FINANCE; INTERNET; NETWORK PROTOCOLS; SECURITY OF DATA; WEB BROWSERS;

EID: 10044293457     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2003.819611     Document Type: Conference Paper
Times cited : (494)

References (56)
  • 5
    • 0018543411 scopus 로고
    • Password security: A case history
    • Nov.
    • R. Morris and K. Thompson, "Password security: A case history," Commun. ACM. vol. 22. no. 11. pp. 594-597, Nov. 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 6
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • B. L. Riddle, M. S. Miron, and J. A. Semo. "Passwords in use in a university timesharing environment," Comput. Security, vol. 8. no. 7, pp. 569-579, 1989.
    • (1989) Comput. Security , vol.8 , Issue.7 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 7
    • 0024777503 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements
    • D. L. Jobusch and A. E. Oldehoeft. "A survey of password mechanisms: Weaknesses and potential improvements," Comput. Security, vol. 8. no. 8, pp. 675-689, 1989.
    • (1989) Comput. Security , vol.8 , Issue.8 , pp. 675-689
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 9
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • [9| M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Comput. Security, vol. 14, no. 3, pp. 233-249. 1995.
    • (1995) Comput. Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 10
    • 0031373072 scopus 로고    scopus 로고
    • Cognitive, associative, and conventional passwords: Recall and guessing rates
    • J. Bunnell. J. Podd, R. Henderson, R. Napier, and J. Kennedy-Moffat, "Cognitive, associative, and conventional passwords: Recall and guessing rates," Comput. Security, vol. 16, no. 7, pp. 645-657, 1997.
    • (1997) Comput. Security , vol.16 , Issue.7 , pp. 645-657
    • Bunnell, J.1    Podd, J.2    Henderson, R.3    Napier, R.4    Kennedy-Moffat, J.5
  • 11
    • 0033633028 scopus 로고    scopus 로고
    • Authentication and supervision: A survey of user attitudes
    • S. M. Furnell, P. S. Dowland. H. M. Illingworth, and P. L. Reynolds. "Authentication and supervision: A survey of user attitudes," Comput. Security, vol. 19, no. 6, pp. 529-539, 2000.
    • (2000) Comput. Security , vol.19 , Issue.6 , pp. 529-539
    • Furnell, S.M.1    Dowland, P.S.2    Illingworth, H.M.3    Reynolds, P.L.4
  • 12
    • 12244272072 scopus 로고    scopus 로고
    • Word association computer passwords: The effect of formulation techniques on recall and guessing rates
    • R. Pond, J. Podd, J. Bunnell, and R. Henderson, "Word association computer passwords: The effect of formulation techniques on recall and guessing rates," Comput. Security, vol. 19. no. 7, pp. 645-656. 2000.
    • (2000) Comput. Security , vol.19 , Issue.7 , pp. 645-656
    • Pond, R.1    Podd, J.2    Bunnell, J.3    Henderson, R.4
  • 20
    • 21244495478 scopus 로고
    • "Method and apparatus for positively identifying an individual," U.S. Patent 4 720 860, Jan. 19
    • K. P. Weiss, "Method and apparatus for positively identifying an individual," U.S. Patent 4 720 860, Jan. 19, 1988.
    • (1988)
    • Weiss, K.P.1
  • 22
    • 0036030112 scopus 로고    scopus 로고
    • Impact of artificial gummy fingers on fingerprint systems
    • T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. "Impact of artificial gummy fingers on fingerprint systems," Proc. SPIE, vol. 4677, pp. 275-289, 2002.
    • (2002) Proc. SPIE , vol.4677 , pp. 275-289
    • Matsumoto, T.1    Matsumoto, H.2    Yamada, K.3    Hoshino, S.4
  • 23
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems." IBM Syst. J.. vol, 40, no. 3, pp. 614-634. 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 29
    • 0033706859 scopus 로고    scopus 로고
    • A biometric standard for information management and security
    • S. M. Matyas Jr. and J. Stapleton, "A biometric standard for information management and security," Comput. Security, vol. 19, no. 5, pp. 428-441, 2000.
    • (2000) Comput. Security , vol.19 , Issue.5 , pp. 428-441
    • Matyas Jr., S.M.1    Stapleton, J.2
  • 30
    • 9644296202 scopus 로고    scopus 로고
    • Biometrics: Truths and fictions
    • Aug.
    • B. Schneier. (1998, Aug.) Biometrics: Truths and fictions. Crypto-Gram [Online] Available: http://www.counterpane.com/ crypto-gram-9808.html
    • (1998) Crypto-gram [Online]
    • Schneier, B.1
  • 31
    • 0031250434 scopus 로고    scopus 로고
    • Fingerprint matching using transformation parameter clustering
    • Oct.-Dec.
    • R. Germain, A. Califano, and S. Colville, "Fingerprint matching using transformation parameter clustering," IEEE Comput. Sci. Eng. Mag., vol. 4, pp. 42-49, Oct.-Dec. 1997.
    • (1997) IEEE Comput. Sci. Eng. Mag. , vol.4 , pp. 42-49
    • Germain, R.1    Califano, A.2    Colville, S.3
  • 32
    • 0033098544 scopus 로고    scopus 로고
    • Error-rate equations for the general biometric system
    • Mar.
    • J. L. Wayman, "Error-rate equations for the general biometric system," IEEE Robot. Automat. Mag., vol. 6, pp. 35-48. Mar. 1999.
    • (1999) IEEE Robot. Automat. Mag. , vol.6 , pp. 35-48
    • Wayman, J.L.1
  • 35
    • 0003602325 scopus 로고
    • (Apr.). Internet Engineering Task Force. [Online]
    • R. Rivest and S. Dusse. (1992, Apr.) The MD5 Message-Digest Algorithm. Internet Engineering Task Force. [Online]. Available: http://www.ietf.org/rfc/ rfc1321.txt?number=1321
    • (1992) The MD5 Message-Digest Algorithm
    • Rivest, R.1    Dusse, S.2
  • 36
  • 38
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12. pp. 993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 39
    • 21244466199 scopus 로고    scopus 로고
    • Liberty alliance or passport?
    • June
    • J. Taschek. (2002, June) Liberty alliance or passport?. eWeek [Online]. Available: http://www.eweek.com/article2/ 0,3959,266840,00.asp
    • (2002) eWeek [Online]
    • Taschek, J.1
  • 41
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • July, Oct.
    • C. E. Shannon. (1948, July, Oct.) A mathematical theory of communication. Bell Syst. Tech. J. [Online], pp. 379-423. Available: http://cm.bell-labs.com/ cm/ms/what/shannonday/paper.html
    • (1948) Bell Syst. Tech. J. [Online] , pp. 379-423
    • Shannon, C.E.1
  • 43
    • 0003629991 scopus 로고
    • U.S. Dept. Commerce, Nat. Inst. Sci. Technol. (NIST), FIPS Pub. 180-1, Apr.
    • "Secure Hash Standard," U.S. Dept. Commerce, Nat. Inst. Sci. Technol. (NIST), FIPS Pub. 180-1, Apr. 1995.
    • (1995) Secure Hash Standard
  • 45
    • 0742292799 scopus 로고    scopus 로고
    • Internet Security Glossary
    • Internet Engineering Task Force, May
    • R. Shirey, "Internet Security Glossary," Internet Engineering Task Force, RFC 2828, May 2000.
    • (2000) RFC , vol.2828
    • Shirey, R.1
  • 46
    • 21244437401 scopus 로고    scopus 로고
    • (Aug.). [Online]
    • User Authentication With Windows NT (2001, Aug.). [Online]. Available: http://support.microsoft.com/default. aspx?scid=kb%3ben-us%3b102 716
    • (2001) User Authentication with Windows NT
  • 49
    • 0036487315 scopus 로고    scopus 로고
    • Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners
    • Feb.
    • R. Derakhshani, S. Schuckers, L. Hornak, and L. O'Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners," Pattern Recogn., vol. 36, no. 2, pp. 383-396, Feb. 2003.
    • (2003) Pattern Recogn. , vol.36 , Issue.2 , pp. 383-396
    • Derakhshani, R.1    Schuckers, S.2    Hornak, L.3    O'Gorman, L.4
  • 50
    • 0034274945 scopus 로고    scopus 로고
    • Automatic verbal information verification for user authentication
    • Sept.
    • Q. Li, B.-H. Juang, Q. Zhou, and C.-H. Lee, "Automatic verbal information verification for user authentication," IEEE Trans. Speech Audio Processing, vol. 8, pp. 585-596, Sept. 2000.
    • (2000) IEEE Trans. Speech Audio Processing , vol.8 , pp. 585-596
    • Li, Q.1    Juang, B.-H.2    Zhou, Q.3    Lee, C.-H.4
  • 53
    • 0033901151 scopus 로고    scopus 로고
    • The NIST 1999 speaker recognition evaluation - An overview
    • A. Martin and M. Przybocki, "The NIST 1999 speaker recognition evaluation - An overview." Dig. Signal Process., vol. 10, no. 1-3, pp. 1-18, 2000.
    • (2000) Dig. Signal Process. , vol.10 , Issue.1-3 , pp. 1-18
    • Martin, A.1    Przybocki, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.