메뉴 건너뛰기




Volumn 17, Issue 1, 2009, Pages 30-43

Formalizing the ranking of authentication products

Author keywords

Data security; Message authentication; Norway; User interfaces

Indexed keywords

AUTHENTICATION METHODS; DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; MESSAGE AUTHENTICATION; NORWAY; PERFORMANCE ANALYSIS; PRODUCT SELECTION; RANKING METHODS; SELECTION PROCESS; TECHNICAL PERFORMANCE; USAGE SCENARIOS;

EID: 67650912580     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220910944740     Document Type: Article
Times cited : (4)

References (22)
  • 1
    • 67650971822 scopus 로고    scopus 로고
    • available at: (accessed 18 April 2007)
    • Abbott, J. (2007), "Smart cards: How secure are they?", available at: www.sans.org/reading_room/whitepapers/authentication/ 131.php, (accessed 18 April 2007).
    • (2007) "Smart Cards: How Secure Are They?"
    • Abbott, J.1
  • 4
    • 51449118740 scopus 로고    scopus 로고
    • "Biometric gait authentication using accelerometer sensor"
    • Gafurov, D., Helkala, K. and Søndrol, T. (2006), "Biometric gait authentication using accelerometer sensor", Journal of computers, Vol. 1 No. 7, pp. 51-9.
    • (2006) Journal of Computers , vol.1 , Issue.7 , pp. 51-59
    • Gafurov, D.1    Helkala, K.2    Søndrol, T.3
  • 6
    • 67650940083 scopus 로고    scopus 로고
    • "User's trust in biometric authentication systems - Do not take end-user for granted"
    • MS thesis in Information Security, Gjøvik University College, Gjøvik
    • Gravnås, H. (2005), "User's trust in biometric authentication systems - do not take end-user for granted", MS thesis in Information Security, Gjøvik University College, Gjøvik.
    • (2005)
    • Gravnås, H.1
  • 8
    • 0032678243 scopus 로고    scopus 로고
    • "The smart card: Don't leave home without it"
    • Husemann, D. (1999), "The smart card: Don't leave home without it", IEEE Concurrency, Vol. 7, pp. 24-7.
    • (1999) IEEE Concurrency , vol.7 , pp. 24-27
    • Husemann, D.1
  • 11
    • 1642298729 scopus 로고    scopus 로고
    • "Best practices in testing and reporting performance of biometric devices NPL report CMSC 14/02"
    • Mansfield, A. and Wayman, J. (2002), "Best practices in testing and reporting performance of biometric devices NPL report CMSC 14/02", NPL Report CMSC 14/02 Version 2.01.
    • (2002) NPL Report CMSC 14/02 Version 2.01
    • Mansfield, A.1    Wayman, J.2
  • 12
    • 67650971816 scopus 로고    scopus 로고
    • MISCO.CO.UK Web site available at: (accessed 26 March)
    • MISCO.CO.UK Web site (2008), "RSA SecurID(applicance", available at: www.misco.co.uk/CONTENT/PROMOS/RSA/SECUREID.ASP?bp1, (accessed 26 March).
    • (2008) "RSA SecurID(applicance"
  • 13
    • 67650968228 scopus 로고    scopus 로고
    • NEUROtechnologijaWeb Site available at (accessed 26 March)
    • NEUROtechnologijaWeb Site (2008a), "Prices for our products", available at: www.neurotechnologija.com/prices.html, (accessed 26 March).
    • (2008) "Prices for Our Products"
  • 14
    • 84926045216 scopus 로고    scopus 로고
    • NEUROtechnologija Web Site available at: (accessed 26 March)
    • NEUROtechnologija Web Site (2008b), "VeriFinger, PC-based fingerprint recognition technology", available at: www.neurotechnologija.com/verifinger.html, (accessed 26 March).
    • (2008) "VeriFinger, PC-based Fingerprint Recognition Technology"
  • 16
    • 10044293457 scopus 로고    scopus 로고
    • "Comparing passwords, tokens, and biometric for user authentication"
    • O'Gorman, L. (2003), "Comparing passwords, tokens, and biometric for user authentication", Proceedings of IEEE, Vol. 91, pp. 2019-40.
    • (2003) Proceedings of IEEE , vol.91 , pp. 2019-2040
    • O'Gorman, L.1
  • 18
    • 12244272072 scopus 로고    scopus 로고
    • "Word association computer passwords: The effect of formulation techniques on recall and guessing rates"
    • Pond, R., Podd, J., Bunnell, J. and Henderson, R. (2000), "Word association computer passwords: The effect of formulation techniques on recall and guessing rates", Computers & Security, Vol. 19, pp. 645-56.
    • (2000) Computers & Security , vol.19 , pp. 645-656
    • Pond, R.1    Podd, J.2    Bunnell, J.3    Henderson, R.4
  • 20
    • 67650955688 scopus 로고    scopus 로고
    • "Threat analysis: How can we compare different authentication methods?"
    • paper presented in the Hyatt Regency Crystal City, Arlington, VA
    • Statham, P. (2005), "Threat analysis: How can we compare different authentication methods?", paper presented in the Biometric Consortium, 2005, Hyatt Regency Crystal City, Arlington, VA.
    • (2005) Biometric Consortium, 2005
    • Statham, P.1
  • 21
    • 84925983060 scopus 로고    scopus 로고
    • StorageMojo Web site available at: Storagemojo.com/?page_ id = 417, (accessed 26 March 2008)
    • StorageMojo Web site (2007), "RSA security price list", available at: Storagemojo.com/?page_ id = 417, (accessed 26 March 2008).
    • (2007) "RSA Security Price List"
  • 22
    • 12844275960 scopus 로고    scopus 로고
    • "Password memorability and security: Empirical results"
    • September/October
    • Yan, J., Blackwell, A., Anderson, R. and Grant, A. (2004), "Password memorability and security: Empirical results", IEEE Security and Privacy, September/October, pp. 25-31.
    • (2004) IEEE Security and Privacy , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.