메뉴 건너뛰기




Volumn , Issue , 2006, Pages 168-178

Fourth-factor authentication: Somebody you know

Author keywords

Authentication; Hardware tokens; Vouchers

Indexed keywords

COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PATTERN RECOGNITION; PUBLIC KEY CRYPTOGRAPHY; REQUIREMENTS ENGINEERING; USER INTERFACES;

EID: 34547363189     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180427     Document Type: Conference Paper
Times cited : (168)

References (17)
  • 1
    • 34547315136 scopus 로고    scopus 로고
    • v-GO SSPR 5.0 product description. Referenced 2006 at www.passlogix.com.
    • v-GO SSPR 5.0 product description. Referenced 2006 at www.passlogix.com.
  • 4
    • 84957800809 scopus 로고    scopus 로고
    • The KeyNote trust management system
    • Security Protocols International Workshop, Springer-Verlag
    • M. Blaze, J. Feigenbaum, and A. D. Keromytis. The KeyNote trust management system. In Security Protocols International Workshop, pages 59-63. Springer-Verlag, 1998. LNCS no. 1550.
    • (1998) LNCS , Issue.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 5
    • 84958048748 scopus 로고    scopus 로고
    • Compliance-checking in the PolicyMaker trust-management system
    • Financial Cryptography, Springer-Verlag
    • M. Blaze, J. Feigenbaum, and M. Strauss. Compliance-checking in the PolicyMaker trust-management system. In Financial Cryptography, pages 251-265. Springer-Verlag, 1998. LNCS no. 1465.
    • (1998) LNCS , Issue.1465 , pp. 251-265
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 6
    • 34547269636 scopus 로고    scopus 로고
    • W. Eazel. 'Live phishing experiment nets consumers hook, line, and sinker. SC Magazine, 8 November 2005. Referenced 2006 at www.scmagazine.com.
    • W. Eazel. 'Live phishing experiment nets consumers hook, line, and sinker. SC Magazine, 8 November 2005. Referenced 2006 at www.scmagazine.com.
  • 9
    • 26444473661 scopus 로고    scopus 로고
    • Messin' with Texas: Deriving mothers maiden names using public records
    • J. Ioannidis, A. D. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security ACNS, Springer-Verlag
    • V. Griffith and M. Jakobsson. Messin' with Texas: Deriving mothers maiden names using public records. In J. Ioannidis, A. D. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security (ACNS), pages 91-103. Springer-Verlag, 2005. LNCS no. 3531.
    • (2005) LNCS , Issue.3531 , pp. 91-103
    • Griffith, V.1    Jakobsson, M.2
  • 10
    • 34547317891 scopus 로고    scopus 로고
    • Product Specification
    • RSA Security Inc. RSA SecurID authenticators, at
    • RSA Security Inc. RSA SecurID authenticators, 2006. Product Specification. Referenced 2006 at www.rsasecurity.com.
    • (2006) Referenced 2006
  • 11
    • 34547318786 scopus 로고    scopus 로고
    • J. Jubak. Globalization isn't what's killing GM. MSN Money, 29 November 2005. Referenced 2006 at moneycentral.msn.com.
    • J. Jubak. Globalization isn't what's killing GM. MSN Money, 29 November 2005. Referenced 2006 at moneycentral.msn.com.
  • 12
    • 34547325935 scopus 로고    scopus 로고
    • D. V. Klein. Foiling the cracker: A survey of and improvements to, password security. In UNIX Security II: USENIX Workshop Proceedings, pages 5-14, Berkeley, CA, 1990.
    • D. V. Klein. Foiling the cracker: A survey of and improvements to, password security. In UNIX Security II: USENIX Workshop Proceedings, pages 5-14, Berkeley, CA, 1990.
  • 13
    • 34547364475 scopus 로고    scopus 로고
    • J. Leyden. Office workers give away passwords for a cheap pen. The Register, 18 April 2003. Referenced 2006 at www.theregister.co.uk.
    • J. Leyden. Office workers give away passwords for a cheap pen. The Register, 18 April 2003. Referenced 2006 at www.theregister.co.uk.
  • 14
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy, pages 110-124, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 16
    • 34547346646 scopus 로고    scopus 로고
    • T. Pullar-Strecker. NZ bank adds security online. Sidney Morning Herald, 8 November 2004. Referenced 2006 at www.smh.com.au.
    • T. Pullar-Strecker. NZ bank adds security online. Sidney Morning Herald, 8 November 2004. Referenced 2006 at www.smh.com.au.
  • 17
    • 84863469085 scopus 로고    scopus 로고
    • Stronger password authentication using browser extensions. In P. McDaniel, editor
    • B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In P. McDaniel, editor, USENIX Security, pages 17-32, 2005.
    • (2005) USENIX Security , pp. 17-32
    • Ross, B.1    Jackson, C.2    Miyake, N.3    Boneh, D.4    Mitchell, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.