메뉴 건너뛰기




Volumn 37, Issue , 2004, Pages 2645-2654

Password-based authentication: A system perspective

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COGNITIVE SYSTEMS; COST EFFECTIVENESS; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC COMMERCE; IDENTIFICATION (CONTROL SYSTEMS); INFORMATION ANALYSIS; INTERCONNECTION NETWORKS; INTERNET; SOFTWARE ENGINEERING; USER INTERFACES;

EID: 12344331343     PISSN: 10603425     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/hicss.2004.1265412     Document Type: Conference Paper
Times cited : (53)

References (48)
  • 5
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way functions much harder to crack
    • U. Manber, "A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack," Computers & Security, vol. 15, pp. 171-176, 1996.
    • (1996) Computers & Security , vol.15 , pp. 171-176
    • Manber, U.1
  • 6
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • B. Menkus, "Understanding the Use of Passwords," Computers & Security, vol. 7, pp. 132-136, 1988.
    • (1988) Computers & Security , vol.7 , pp. 132-136
    • Menkus, B.1
  • 7
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • B. L. Riddle, Miron, M. S., Semo, J. A., "Passwords in Use in a University Timesharing Environment," Computers & Security, vol. 8, pp. 569-579, 1989.
    • (1989) Computers & Security , vol.8 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 8
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • W. Yang, Shieh, S., "Password Authentication Schemes with Smart Cards," Computers & Security, vol. 18, pp. 727-733, 1999.
    • (1999) Computers & Security , vol.18 , pp. 727-733
    • Yang, W.1    Shieh, S.2
  • 10
    • 3042781449 scopus 로고    scopus 로고
    • Toward reliable user authentication through biometrics
    • J. Vaclav Matyas and Z. Riha, "Toward Reliable User Authentication Through Biometrics," IEEE Security & Privacy, vol. I, pp. 45-49, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 45-49
    • Matyas, J.V.1    Riha, Z.2
  • 11
    • 0024771630 scopus 로고
    • A simple way of improving the login security
    • K. Dehnad, "A Simple Way of Improving the Login Security," Computers & Security, vol. 8, pp. 607-611, 1989.
    • (1989) Computers & Security , vol.8 , pp. 607-611
    • Dehnad, K.1
  • 12
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop, and Klein, D.V., "Improving System Security via Proactive Password Checking," Computers and Security, vol. 14, 1992.
    • (1992) Computers and Security , vol.14
    • Bishop, M.1    Klein, D.V.2
  • 13
    • 0023328831 scopus 로고
    • Verifying the authentication of an information system user
    • N. Ahituv, Lapid, Y., Neumann, S., "Verifying the Authentication of an Information System User," Computers & Security, vol. 6, pp. 152-157, 1987.
    • (1987) Computers & Security , vol.6 , pp. 152-157
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 14
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • J. Evans, Arthur, Kantrowitz, William, Weiss, Edwin, "A User Authentication Scheme Not Requiring Secrecy in the Computer," Communications of the ACM, vol. 17, pp. 437-445, 1974.
    • (1974) Communications of the ACM , vol.17 , pp. 437-445
    • Evans, J.1    Arthur2    Kantrowitz, W.3    Weiss, E.4
  • 15
    • 0024771499 scopus 로고
    • A survey of password mechanisms:Weakness and potential improvements. Part 1
    • D. L. Jobusch, Oldehoeft, A. E., "A Survey of Password Mechanisms:Weakness and Potential Improvements. Part 1," Computers & Security, vol. 8, pp. 587-604, 1989.
    • (1989) Computers & Security , vol.8 , pp. 587-604
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 16
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol. 24, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 17
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C. Lin, Hwang, T., "A password authentication scheme with secure password updating," Computers & Security, vol. 22, pp. 68-72, 2003.
    • (2003) Computers & Security , vol.22 , pp. 68-72
    • Lin, C.1    Hwang, T.2
  • 19
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris, Thompson, K., " Password Security: A Case history," Communications of the ACM, vol. 22, pp. 594-597, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 20
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian, Zunic, N., "Methods for Protecting Password Transmission," Computers & Security, vol. 19, pp. 466-469, 2000.
    • (2000) Computers & Security , vol.19 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 21
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • M. Zviran, Haga, William, "A Comparison of Password Techniques for Multilevel Authentication Mechanisms," The Computer Journal, vol. 36, pp. 227-237, 1993.
    • (1993) The Computer Journal , vol.36 , pp. 227-237
    • Zviran, M.1    Haga, W.2
  • 23
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • G. A. Miller, "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information," The Psychological Review, vol. 63, pp. 81-97, 1956.
    • (1956) The Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 25
    • 12244272072 scopus 로고    scopus 로고
    • Word association computer passwords: The effect of formulation techniques on recall and guessing rates
    • R. Pond, Podd, J., Bunnell, J., Henderson, R., "Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates," Computers & Security, vol. 19, pp. 645-656, 2000.
    • (2000) Computers & Security , vol.19 , pp. 645-656
    • Pond, R.1    Podd, J.2    Bunnell, J.3    Henderson, R.4
  • 26
    • 0019895650 scopus 로고
    • A password extension for improved human factors
    • S. N. Porter, "A Password Extension for Improved Human Factors," Computers & Security, vol. 1, pp. 54-56, 1982.
    • (1982) Computers & Security , vol.1 , pp. 54-56
    • Porter, S.N.1
  • 28
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • S. L. Smith, "Authenticating Users by Word Association," Computers & Security, vol. 6, pp. 464-467, 1987.
    • (1987) Computers & Security , vol.6 , pp. 464-467
    • Smith, S.L.1
  • 29
    • 85013063433 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security in the real world
    • Cloudcroft, New Mexico
    • D. Weirich and M. A. Sasse, "Pretty Good Persuasion: A first step towards effective password security in the real world," presented at New security paradigms, Cloudcroft, New Mexico, 2002.
    • (2002) New Security Paradigms
    • Weirich, D.1    Sasse, M.A.2
  • 35
    • 12344254369 scopus 로고    scopus 로고
    • Way too many passwords, not enough protection
    • online edition ed. Chicago
    • S. Swanson, "Way too many passwords, not enough protection," in Chicago Tribune, online edition ed. Chicago, 2003, pp. 1.
    • (2003) Chicago Tribune , pp. 1
    • Swanson, S.1
  • 37
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • J. J. Whitmore, "A method for designing secure solutions," IBM Systems Journal, vol. 40, pp. 747-768, 2001.
    • (2001) IBM Systems Journal , vol.40 , pp. 747-768
    • Whitmore, J.J.1
  • 38
    • 12344280611 scopus 로고    scopus 로고
    • Liberty Alliance Project
    • Liberty Alliance Project, "Business Benefits of Federated Identity," vol. 2003: Liberty Alliance Project, 2003.
    • (2003) Business Benefits of Federated Identity , vol.2003
  • 39
    • 0026869371 scopus 로고
    • Opus: Preventing weak password choices
    • E. Spafford, "Opus: Preventing weak password choices," Computers & Security, vol. 11, pp. 273-278, 1992.
    • (1992) Computers & Security , vol.11 , pp. 273-278
    • Spafford, E.1
  • 41
    • 0040231044 scopus 로고
    • Foiling the cracker; A survey of, and improvements to unix password security
    • D. V. Klein, "Foiling the Cracker; A Survey of, and Improvements to Unix Password Security," presented at Proceedings of the USENIX Security Workshop, 1990.
    • (1990) Proceedings of the USENIX Security Workshop
    • Klein, D.V.1
  • 43
  • 45
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. P. Jablon, "Strong password-only authenticated key exchange," ACM SIGCOMM Computer Communication Review, vol. 26, pp. 5-26, 1996.
    • (1996) ACM SIGCOMM Computer Communication Review , vol.26 , pp. 5-26
    • Jablon, D.P.1
  • 46
    • 0024777503 scopus 로고
    • A survey of password mechanisms:Weakness and potential improvements. Part 2
    • D. L. Jobusch, Oldehoeft, A. E., "A Survey of Password Mechanisms:Weakness and Potential Improvements. Part 2," Computers & Security, vol. 8, pp. 675-689, 1989.
    • (1989) Computers & Security , vol.8 , pp. 675-689
    • Jobusch, D.L.1    Oldehoeft, A.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.