메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Breaking randomized linear generation functions based virtual password system

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SYSTEMS; CHALLENGE RESPONSE PROTOCOLS; HIGH PROBABILITY; IDENTITY THEFT; PASSWORD SYSTEMS; PHISHING; SHOULDER SURFING; USER AUTHENTICATION; USER AUTHENTICATION SYSTEMS;

EID: 77955388623     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2010.5502416     Document Type: Conference Paper
Times cited : (7)

References (37)
  • 5
    • 84995399871 scopus 로고
    • Human identification through insecure channel
    • Advances in Cryptology - EUROCRYPT'91, ser. D. Davies, Ed., Berlin: Springer-Verlag
    • T. Matsumoto and H. Imai, "Human identification through insecure channel," in Advances in Cryptology - EUROCRYPT'91, ser. Lecture Notes in Computer Science, D. Davies, Ed., vol. 547. Berlin: Springer-Verlag, 1991, pp. 409-421.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 8
    • 56949095051 scopus 로고    scopus 로고
    • Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
    • M. Lei, Y. Xiao, S. V. Vrbsky, and C.-C. Li, "Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing," Computer Communications, vol. 31, no. 18, pp. 4367-4375, 2008.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4367-4375
    • Lei, M.1    Xiao, Y.2    Vrbsky, S.V.3    Li, C.-C.4
  • 10
    • 0021481768 scopus 로고
    • Pass-algorithms: A user validation scheme based on knowledge of secret algorithms
    • J. A. Haskett, "Pass-algorithms: A user validation scheme based on knowledge of secret algorithms," Communications of the ACM, vol. 27, no. 8, pp. 777-781, 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 777-781
    • Haskett, J.A.1
  • 12
    • 56649111144 scopus 로고    scopus 로고
    • Can 'something you know' be saved?
    • Information Security (Proceedings of ISC 2008), ser. T.-C. Wu, Ed., Berlin / Heidelberg: Springer
    • B. Coskun and C. Herley, "Can 'something you know' be saved?" in Information Security (Proceedings of ISC 2008), ser. Lecture Notes in Computer Science, T.-C. Wu, Ed., vol. 5222. Berlin / Heidelberg: Springer, 2008, pp. 421-440.
    • (2008) Lecture Notes in Computer Science , vol.5222 , pp. 421-440
    • Coskun, B.1    Herley, C.2
  • 13
    • 33751034055 scopus 로고    scopus 로고
    • Secure human-computer identification (interface) systems against peeping attacks: SecHCI
    • August [Online]. Available: http://www.hooklee.com/Papers/SecHCI-Survey. pdf
    • S. Li and H.-Y. Shum, "Secure human-computer identification (interface) systems against peeping attacks: SecHCI," IACR's Cryptology ePrint Archive: Report 2005/268, http://eprint.iacr.org/2005/268, August 2005. [Online]. Available: http://www.hooklee.com/Papers/SecHCI-Survey.pdf
    • (2005) IACR's Cryptology EPrint Archive: Report 2005/268
    • Li, S.1    Shum, H.-Y.2
  • 14
    • 0042044284 scopus 로고    scopus 로고
    • Practical human-machine identification over insecure channels
    • X.-Y. Li and S.-H. Teng, "Practical human-machine identification over insecure channels," Journal of Combinatorial Optimization, vol. 3, no. 4, pp. 347-361, 1999.
    • (1999) Journal of Combinatorial Optimization , vol.3 , Issue.4 , pp. 347-361
    • Li, X.-Y.1    Teng, S.-H.2
  • 15
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware (short paper)
    • IEEE Computer Society
    • D. Weinshall, "Cognitive authentication schemes safe against spyware (short paper)," in Proceedings of IEEE Symposium on Security and Privacy (S&P'2006). IEEE Computer Society, 2006, pp. 295-300.
    • (2006) Proceedings of IEEE Symposium on Security and Privacy (S&P'2006) , pp. 295-300
    • Weinshall, D.1
  • 18
    • 77950846494 scopus 로고    scopus 로고
    • Human identification through image evaluation using secret predicates
    • Topics in Cryptology - CTRSA 2007, ser. Berlin / Heidelberg: Springer
    • H. Jameel, R. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," in Topics in Cryptology - CTRSA 2007, ser. Lecture Notes in Computer Science, vol. 4377. Berlin / Heidelberg: Springer, 2007, pp. 67-84.
    • (2007) Lecture Notes in Computer Science , vol.4377 , pp. 67-84
    • Jameel, H.1    Shaikh, R.2    Lee, H.3    Lee, S.4
  • 19
    • 70350647479 scopus 로고    scopus 로고
    • Image-feature based human identification protocols on limited display devices
    • Information Security Applications (Revised Selected Papers of WISA 2008), ser. Berlin / Heidelberg: Springer
    • H. Jameel, R. Shaikh, L. Hung, Y. Wei, S. Raazi, N. Canh, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Image-feature based human identification protocols on limited display devices," in Information Security Applications (Revised Selected Papers of WISA 2008), ser. Lecture Notes in Computer Science, vol. 5379. Berlin / Heidelberg: Springer, 2009, pp. 211-224.
    • (2009) Lecture Notes in Computer Science , vol.5379 , pp. 211-224
    • Jameel, H.1    Shaikh, R.2    Hung, L.3    Wei, Y.4    Raazi, S.5    Canh, N.6    Lee, S.7    Lee, H.8    Son, Y.9    Fernandes, M.10
  • 24
    • 84957372142 scopus 로고
    • On the Matsumoto and Imai's human identification scheme
    • Advances in Cryptology - EUROCRYPT' 95, ser. Berlin / Heidelberg: Springer
    • C.-H. Wang, T. Hwang, and J.-J. Tsai, "On the Matsumoto and Imai's human identification scheme," in Advances in Cryptology - EUROCRYPT' 95, ser. Lecture Notes in Computer Science, vol. 921. Berlin / Heidelberg: Springer, 1995, pp. 382-392.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 382-392
    • Wang, C.-H.1    Hwang, T.2    Tsai, J.-J.3
  • 27
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - ASIACRYPT 2001, ser. C. Boyd, Ed., Springer-Verlag, Berlin
    • N. J. Hopper and M. Blum, "Secure human identification protocols," in Advances in Cryptology - ASIACRYPT 2001, ser. Lecture Notes in Computer Science, C. Boyd, Ed., vol. 2248. Springer-Verlag, Berlin, 2001, pp. 52-66.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 28
    • 85084161493 scopus 로고    scopus 로고
    • Déjà Vu: A user study using images for authentication
    • USENIX Association
    • R. Dhamija and A. Perrig, "Déjà Vu: A user study using images for authentication," in Proceedings of 9th USENIX Security Symposium. USENIX Association, 2000, pp. 45-58.
    • (2000) Proceedings of 9th USENIX Security Symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 31
    • 34250782167 scopus 로고    scopus 로고
    • A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
    • Pittsburgh, Pennsylvania: ACM
    • F. Tari, A. A. Ozok, and S. H. Holden, "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords," in Proceedings of 2nd Symposium on Usable Privacy and Security (SOUPS'2006). Pittsburgh, Pennsylvania: ACM, 2006, pp. 56-66.
    • (2006) Proceedings of 2nd Symposium on Usable Privacy and Security (SOUPS'2006) , pp. 56-66
    • Tari, F.1    Ozok, A.A.2    Holden, S.H.3
  • 32
    • 33744903116 scopus 로고    scopus 로고
    • A user authentication system using schema of visual memory
    • Biologically Inspired Approaches to Advanced Information Technology (Proceedings of BioADIT 2006), ser. A. J. Ijspeert, T. Masuzawa, and S. Kusumoto, Eds., Berlin / Heidelberg: Springer
    • A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki, "A user authentication system using schema of visual memory," in Biologically Inspired Approaches to Advanced Information Technology (Proceedings of BioADIT 2006), ser. Lecture Notes in Computer Science, A. J. Ijspeert, T. Masuzawa, and S. Kusumoto, Eds., vol. 3853. Berlin / Heidelberg: Springer, 2006, pp. 338-345.
    • (2006) Lecture Notes in Computer Science , vol.3853 , pp. 338-345
    • Harada, A.1    Isarida, T.2    Mizuno, T.3    Nishigaki, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.