메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 651-663

oPass: A user authentication protocol resistant to password stealing and password reuse attacks

Author keywords

Network security; password reuse attack; password stealing attack; user authentication

Indexed keywords

CELL PHONE; DOMINO EFFECTS; KEYLOGGERS; MALWARES; PASSWORD REUSE ATTACK; PASSWORD STEALING ATTACK; PHISHING; PHONE NUMBER; SHORT MESSAGE SERVICES; TELECOMMUNICATION SERVICE PROVIDER; TEXT PASSWORD; THREATS AND VULNERABILITIES; USER AUTHENTICATION; USER AUTHENTICATION PROTOCOLS; WEB AUTHENTICATION;

EID: 84863343959     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2169958     Document Type: Conference Paper
Times cited : (99)

References (48)
  • 1
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Commun. ACM, vol. 47, no. 4, pp. 75-78, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 6
  • 8
    • 19944381937 scopus 로고    scopus 로고
    • Passpoints: Design and longitudinal evaluation of a graphical password system
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Passpoints: Design and longitudinal evaluation of a graphical password system," Int. J. Human-Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005.
    • (2005) Int. J. Human-Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 12
    • 34250747969 scopus 로고    scopus 로고
    • Passpet: Convenient password management and phishing protection
    • New York, ACM
    • K.-P. Yee and K. Sitaker, "Passpet: Convenient password management and phishing protection," in SOUPS '06: Proc. 2nd Symp. Usable Privacy Security, New York, 2006, pp. 32-43, ACM.
    • (2006) SOUPS '06: Proc. 2nd Symp. Usable Privacy Security , pp. 32-43
    • Yee, K.-P.1    Sitaker, K.2
  • 15
    • 85084163855 scopus 로고    scopus 로고
    • Graphical dictionaries and thememorable space of graphical passwords
    • Berkeley, CA, USENIX Association
    • J. Thorpe and P. C. van Oorschot, "Graphical dictionaries and thememorable space of graphical passwords," in SSYM'04: Proc. 13th Conf. USENIX Security Symp., Berkeley, CA, 2004, pp. 10-10, USENIX Association.
    • (2004) SSYM'04: Proc. 13th Conf. USENIX Security Symp. , pp. 10-10
    • Thorpe, J.1    Van Oorschot, P.C.2
  • 16
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot-spots in graphical passwords
    • Berkeley, CA, USENIX Association
    • J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot-spots in graphical passwords," in SS'07: Proc. 16th USENIX Security Symp. USENIX Security, Berkeley, CA, 2007, pp. 1-16, USENIX Association.
    • (2007) SS'07: Proc. 16th USENIX Security Symp. USENIX Security , pp. 1-16
    • Thorpe, J.1    Van Oorschot, P.C.2
  • 20
    • 78649809598 scopus 로고    scopus 로고
    • Learning more about the underground economy:Acase-study of keyloggers and dropzones
    • T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy:Acase-study of keyloggers and dropzones," Proc. Computer Security ESORICS 2009, pp. 1-18, 2010.
    • (2010) Proc. Computer Security ESORICS , vol.2009 , pp. 1-18
    • Holz, T.1    Engelberth, M.2    Freiling, F.3
  • 22
    • 84863357361 scopus 로고    scopus 로고
    • Phishing Activity Trends Rep. [Online]. Available
    • Phishing Activity Trends Rep., 2nd Quarter/2010 Anti-Phishing Working Group [Online]. Available: http://www.antiphishing.org/
    • 2nd Quarter/2010 Anti-Phishing Working Group
  • 26
    • 84871631323 scopus 로고    scopus 로고
    • [Online]. Available
    • RSA SecureID [Online]. Available: http://www.rsa.com/node. aspx?id=1156/
    • RSA SecureID
  • 27
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • Dec.
    • L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proc. IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003.
    • (2003) Proc. IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 28
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 29
    • 84908683107 scopus 로고    scopus 로고
    • Security analysis of SHA-256 and sisters
    • Springer
    • H. Gilbert and H. Handschuh, "Security analysis of SHA-256 and sisters," in Selected Areas Cryptography, 2003, pp. 175-193, Springer.
    • (2003) Selected Areas Cryptography , pp. 175-193
    • Gilbert, H.1    Handschuh, H.2
  • 31
    • 38549103537 scopus 로고    scopus 로고
    • I. T. Report, ITU Internet Rep. 2006, [Online]. Available
    • I. T. Report, ITU Internet Rep. 2006: Digital.Life [Online]. Available: http://www.itu.int/
    • Digital.Life
  • 35
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm," Advances Cryptology-ASIACRYPT 2000, pp. 531-545, 2000.
    • (2000) Advances Cryptology-ASIACRYPT , vol.2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 36
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • H. Krawczyk, "The order of encryption and authentication for protecting communications (or: How secure is SSL?)," in Advances Cryptology- CRYPTO 2001, 2001, pp. 310-331.
    • (2001) Advances Cryptology- CRYPTO 2001 , pp. 310-331
    • Krawczyk, H.1
  • 39
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • New York, ACM
    • M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proc. 17th ACM Conf. Computer Communications Security, New York, 2010, pp. 162-175, ACM.
    • (2010) Proc. 17th ACM Conf. Computer Communications Security , pp. 162-175
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 42
    • 33745587007 scopus 로고    scopus 로고
    • Conditional estimators: An effective attack on A5/1
    • NewYork: Springer
    • E. Barkan and E. Biham, "Conditional estimators: An effective attack on A5/1," in Selected Areas in Cryptography. NewYork:Springer, 2006, pp. 1-19.
    • (2006) Selected Areas in Cryptography , pp. 1-19
    • Barkan, E.1    Biham, E.2
  • 43
    • 38549118817 scopus 로고    scopus 로고
    • Using a personal device to strengthen password authentication from an untrusted computer
    • M. Mannan and P. van Oorschot, "Using a personal device to strengthen password authentication from an untrusted computer," Financial Cryptography Data Security, pp. 88-103, 2007.
    • (2007) Financial Cryptography Data Security , pp. 88-103
    • Mannan, M.1    Van Oorschot, P.2
  • 44
    • 85077302433 scopus 로고    scopus 로고
    • Bump in the ether: A framework for securing sensitive user input
    • J.McCune, A. Perrig, andM. Reiter, "Bump in the ether: A framework for securing sensitive user input," in USENIX Annu. Tech. Conf., 2006, pp. 185-198.
    • (2006) USENIX Annu. Tech. Conf. , pp. 185-198
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 45
    • 70450194695 scopus 로고    scopus 로고
    • SessionMagnifier: A simple approach to secure and convenient kiosk browsing
    • ACM
    • C. Yue and H. Wang, "SessionMagnifier: A simple approach to secure and convenient kiosk browsing," in Proc. 11th Int. Conf. Ubiquitous Computing, 2009, pp. 125-134, ACM.
    • (2009) Proc. 11th Int. Conf. Ubiquitous Computing , pp. 125-134
    • Yue, C.1    Wang, H.2
  • 46
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving ssh-style host authentication with multi-path probing
    • Berkeley, CA, USENIX Association
    • D. Wendlandt, D. G. Andersen, and A. Perrig, "Perspectives: Improving ssh-style host authentication with multi-path probing," in Proc. USENIX 2008 Annu. Tech. Conf., Berkeley, CA, 2008, pp. 321-334, USENIX Association.
    • (2008) Proc. USENIX 2008 Annu. Tech. Conf. , pp. 321-334
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3
  • 47
    • 34548786769 scopus 로고    scopus 로고
    • Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies," in Proc. 2007 IEEE Symp. Security Privacy, 2007.
    • (2007) Proc. 2007 IEEE Symp. Security Privacy
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 48
    • 80755186276 scopus 로고    scopus 로고
    • Graphical passwords: Learning from the first twelve years
    • Carleton Univ.
    • R. Biddle, S. Chiasson, and P. van Oorschot, "Graphical passwords: Learning from the first twelve years," in ACM Computing Surveys, Carleton Univ., 2010.
    • (2010) ACM Computing Surveys
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.