-
1
-
-
0000523051
-
A logic of authentication
-
M. Burrows, Abadi, M., Needham, R., "A Logic of Authentication, " Proceedings of the Royal Society of London, pp. 233-271, 1989.
-
(1989)
Proceedings of the Royal Society of London
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, Abadi, M., Burrows, M., Wobber, E., "Authentication in Distributed Systems: Theory and Practice," ACM Transactions Computer Systems, vol. 10, pp. 265-310, 1992.
-
(1992)
ACM Transactions Computer Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
5
-
-
0029696153
-
A simple scheme to make passwords based on one-way functions much harder to crack
-
U. Manber, "A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack," Computers & Security, vol. 15, pp. 171-176, 1996.
-
(1996)
Computers & Security
, vol.15
, pp. 171-176
-
-
Manber, U.1
-
6
-
-
0023995273
-
Understanding the use of passwords
-
B. Menkus, "Understanding the Use of Passwords," Computers & Security, vol. 7, pp. 132-136, 1988.
-
(1988)
Computers & Security
, vol.7
, pp. 132-136
-
-
Menkus, B.1
-
7
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
B. L. Riddle, Miron, M. S., Semo, J. A., "Passwords in Use in a University Timesharing Environment," Computers & Security, vol. 8, pp. 569-579, 1989.
-
(1989)
Computers & Security
, vol.8
, pp. 569-579
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
8
-
-
0033350090
-
Password authentication schemes with smart cards
-
W. Yang, Shieh, S., "Password Authentication Schemes with Smart Cards," Computers & Security, vol. 18, pp. 727-733, 1999.
-
(1999)
Computers & Security
, vol.18
, pp. 727-733
-
-
Yang, W.1
Shieh, S.2
-
9
-
-
0027678308
-
Authentication and delegation with smart-cards
-
M. Abadi, Burrows, M., Kaufman, C., Lampson, B., "Authentication and delegation with smart-cards," Science of Computer Programming, vol. 21, pp. 91-113, 1993.
-
(1993)
Science of Computer Programming
, vol.21
, pp. 91-113
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
10
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
J. Vaclav Matyas and Z. Riha, "Toward Reliable User Authentication Through Biometrics," IEEE Security & Privacy, vol. I, pp. 45-49, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 45-49
-
-
Matyas, J.V.1
Riha, Z.2
-
11
-
-
0024771630
-
A simple way of improving the login security
-
K. Dehnad, "A Simple Way of Improving the Login Security," Computers & Security, vol. 8, pp. 607-611, 1989.
-
(1989)
Computers & Security
, vol.8
, pp. 607-611
-
-
Dehnad, K.1
-
12
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop, and Klein, D.V., "Improving System Security via Proactive Password Checking," Computers and Security, vol. 14, 1992.
-
(1992)
Computers and Security
, vol.14
-
-
Bishop, M.1
Klein, D.V.2
-
13
-
-
0023328831
-
Verifying the authentication of an information system user
-
N. Ahituv, Lapid, Y., Neumann, S., "Verifying the Authentication of an Information System User," Computers & Security, vol. 6, pp. 152-157, 1987.
-
(1987)
Computers & Security
, vol.6
, pp. 152-157
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
14
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
J. Evans, Arthur, Kantrowitz, William, Weiss, Edwin, "A User Authentication Scheme Not Requiring Secrecy in the Computer," Communications of the ACM, vol. 17, pp. 437-445, 1974.
-
(1974)
Communications of the ACM
, vol.17
, pp. 437-445
-
-
Evans, J.1
Arthur2
Kantrowitz, W.3
Weiss, E.4
-
15
-
-
0024771499
-
A survey of password mechanisms:Weakness and potential improvements. Part 1
-
D. L. Jobusch, Oldehoeft, A. E., "A Survey of Password Mechanisms:Weakness and Potential Improvements. Part 1," Computers & Security, vol. 8, pp. 587-604, 1989.
-
(1989)
Computers & Security
, vol.8
, pp. 587-604
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
16
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C. Lin, Hwang, T., "A password authentication scheme with secure password updating," Computers & Security, vol. 22, pp. 68-72, 2003.
-
(2003)
Computers & Security
, vol.22
, pp. 68-72
-
-
Lin, C.1
Hwang, T.2
-
19
-
-
0018543411
-
Password security: A case history
-
R. Morris, Thompson, K., " Password Security: A Case history," Communications of the ACM, vol. 22, pp. 594-597, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
20
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian, Zunic, N., "Methods for Protecting Password Transmission," Computers & Security, vol. 19, pp. 466-469, 2000.
-
(2000)
Computers & Security
, vol.19
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
21
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
M. Zviran, Haga, William, "A Comparison of Password Techniques for Multilevel Authentication Mechanisms," The Computer Journal, vol. 36, pp. 227-237, 1993.
-
(1993)
The Computer Journal
, vol.36
, pp. 227-237
-
-
Zviran, M.1
Haga, W.2
-
23
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
G. A. Miller, "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information," The Psychological Review, vol. 63, pp. 81-97, 1956.
-
(1956)
The Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
24
-
-
0043232732
-
Users are not the enemy
-
A. Adams, Sasse, M. A., "Users Are Not The Enemy," Communications of the ACM, vol. 42, pp. 41-46, 1997.
-
(1997)
Communications of the ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
25
-
-
12244272072
-
Word association computer passwords: The effect of formulation techniques on recall and guessing rates
-
R. Pond, Podd, J., Bunnell, J., Henderson, R., "Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates," Computers & Security, vol. 19, pp. 645-656, 2000.
-
(2000)
Computers & Security
, vol.19
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
26
-
-
0019895650
-
A password extension for improved human factors
-
S. N. Porter, "A Password Extension for Improved Human Factors," Computers & Security, vol. 1, pp. 54-56, 1982.
-
(1982)
Computers & Security
, vol.1
, pp. 54-56
-
-
Porter, S.N.1
-
28
-
-
0039068594
-
Authenticating users by word association
-
S. L. Smith, "Authenticating Users by Word Association," Computers & Security, vol. 6, pp. 464-467, 1987.
-
(1987)
Computers & Security
, vol.6
, pp. 464-467
-
-
Smith, S.L.1
-
29
-
-
85013063433
-
Pretty good persuasion: A first step towards effective password security in the real world
-
Cloudcroft, New Mexico
-
D. Weirich and M. A. Sasse, "Pretty Good Persuasion: A first step towards effective password security in the real world," presented at New security paradigms, Cloudcroft, New Mexico, 2002.
-
(2002)
New Security Paradigms
-
-
Weirich, D.1
Sasse, M.A.2
-
30
-
-
0008915230
-
-
Cambridge University Computer Laboratory
-
J. Yan, Blackwell, A., Anderson, R., Grant, A., "The Memorability and Security of Passwords Some Empirical Results," Cambridge University Computer Laboratory.
-
The Memorability and Security of Passwords Some Empirical Results
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
31
-
-
0033277446
-
Password security: An empirical study
-
M. Zviran, Haga, William, "Password Security: An Empirical Study," Journal of Management Information Systems, vol. 15, pp. 161-185, 1999.
-
(1999)
Journal of Management Information Systems
, vol.15
, pp. 161-185
-
-
Zviran, M.1
Haga, W.2
-
35
-
-
12344254369
-
Way too many passwords, not enough protection
-
online edition ed. Chicago
-
S. Swanson, "Way too many passwords, not enough protection," in Chicago Tribune, online edition ed. Chicago, 2003, pp. 1.
-
(2003)
Chicago Tribune
, pp. 1
-
-
Swanson, S.1
-
37
-
-
0034816038
-
A method for designing secure solutions
-
J. J. Whitmore, "A method for designing secure solutions," IBM Systems Journal, vol. 40, pp. 747-768, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, pp. 747-768
-
-
Whitmore, J.J.1
-
38
-
-
12344280611
-
-
Liberty Alliance Project
-
Liberty Alliance Project, "Business Benefits of Federated Identity," vol. 2003: Liberty Alliance Project, 2003.
-
(2003)
Business Benefits of Federated Identity
, vol.2003
-
-
-
39
-
-
0026869371
-
Opus: Preventing weak password choices
-
E. Spafford, "Opus: Preventing weak password choices," Computers & Security, vol. 11, pp. 273-278, 1992.
-
(1992)
Computers & Security
, vol.11
, pp. 273-278
-
-
Spafford, E.1
-
41
-
-
0040231044
-
Foiling the cracker; A survey of, and improvements to unix password security
-
D. V. Klein, "Foiling the Cracker; A Survey of, and Improvements to Unix Password Security," presented at Proceedings of the USENIX Security Workshop, 1990.
-
(1990)
Proceedings of the USENIX Security Workshop
-
-
Klein, D.V.1
-
42
-
-
0242444871
-
Making passwords secure and usable
-
A. Adams, Sasse, M. A., Lunt, P., "Making Passwords Secure and Usable," presented at People & Computers XII (Proceedings of HCI '97), 1997.
-
(1997)
People & Computers XII (Proceedings of HCI '97)
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
43
-
-
0030150177
-
Comparing information without leaking it
-
R. Fagin, Moni, N., Winkler, P., "Comparing Information Without Leaking it," Communications of the ACM, vol. 39, pp. 77-85, 1996.
-
(1996)
Communications of the ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Moni, N.2
Winkler, P.3
-
44
-
-
0030234754
-
Robust and secure password and key exchange method
-
R. Hauser, Janson, Philippe, Tsudik, Gene, Van Herreweghen, Els, Molva, Refik, "Robust and Secure Password and Key Exchange Method," Journal of Computer Security, vol. 4, pp. 97-111, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 97-111
-
-
Hauser, R.1
Janson, P.2
Tsudik, G.3
Van Herreweghen, E.4
Molva, R.5
-
45
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon, "Strong password-only authenticated key exchange," ACM SIGCOMM Computer Communication Review, vol. 26, pp. 5-26, 1996.
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, pp. 5-26
-
-
Jablon, D.P.1
-
46
-
-
0024777503
-
A survey of password mechanisms:Weakness and potential improvements. Part 2
-
D. L. Jobusch, Oldehoeft, A. E., "A Survey of Password Mechanisms:Weakness and Potential Improvements. Part 2," Computers & Security, vol. 8, pp. 675-689, 1989.
-
(1989)
Computers & Security
, vol.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
47
-
-
12344337883
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm," vol. 2003, 2003.
-
(2003)
The Spread of the Sapphire/Slammer Worm
, vol.2003
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
|