메뉴 건너뛰기




Volumn , Issue , 2012, Pages 553-567

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

Author keywords

authentication; computer security; deployability; economics; human computer interaction; security and usability; software engineering

Indexed keywords

AUTHENTICATION; SOFTWARE ENGINEERING;

EID: 84878353718     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.44     Document Type: Conference Paper
Times cited : (796)

References (67)
  • 2
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thompson, "Password security: a case history," Commun. ACM, vol. 22, no. 11, pp. 594-597, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not The Enemy
    • A. Adams and M. Sasse, "Users Are Not The Enemy," Commun. ACM, vol. 42, no. 12, pp. 41-46, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.2
  • 4
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley and P. C. van Oorschot, "A research agenda acknowledging the persistence of passwords," IEEE Security & Privacy, vol. 10, no. 1, pp. 28-36, 2012.
    • (2012) IEEE Security & Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.C.2
  • 5
    • 77954754833 scopus 로고    scopus 로고
    • One-Time Password Access to Any Server Without Changing the Server
    • D. Florêncio and C. Herley, "One-Time Password Access to Any Server Without Changing the Server," ISC 2008, Taipei.
    • ISC 2008, Taipei
    • Florêncio, D.1    Herley, C.2
  • 6
    • 79960801872 scopus 로고    scopus 로고
    • Leveraging personal devices for stronger password authentication from untrusted computers
    • M. Mannan and P. C. van Oorschot, "Leveraging personal devices for stronger password authentication from untrusted computers," Journal of Computer Security, vol. 19, no. 4, pp. 703-750, 2011.
    • (2011) Journal of Computer Security , vol.19 , Issue.4 , pp. 703-750
    • Mannan, M.1    Van Oorschot, P.C.2
  • 7
    • 84856260670 scopus 로고    scopus 로고
    • Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
    • S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot, "Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism," IEEE Trans. on Dependable and Secure Computing, vol. 9, no. 2, pp. 222-235, 2012.
    • (2012) IEEE Trans. on Dependable and Secure Computing , vol.9 , Issue.2 , pp. 222-235
    • Chiasson, S.1    Stobert, E.2    Forget, A.3    Biddle, R.4    Van Oorschot, P.C.5
  • 8
    • 84855796670 scopus 로고    scopus 로고
    • Pico: No more passwords!
    • Proc. Sec. Protocols Workshop 2011, ser. Springer
    • F. Stajano, "Pico: No more passwords!" in Proc. Sec. Protocols Workshop 2011, ser. LNCS, vol. 7114. Springer.
    • LNCS , vol.7114
    • Stajano, F.1
  • 9
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • December
    • L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2019-2040, December 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2019-2040
    • O'Gorman, L.1
  • 10
    • 33751109662 scopus 로고    scopus 로고
    • Quantification of authentication mechanisms: A usability perspective
    • K. Renaud, "Quantification of authentication mechanisms: a usability perspective," J. Web Eng., vol. 3, no. 2, pp. 95-123, 2004.
    • (2004) J. Web Eng. , vol.3 , Issue.2 , pp. 95-123
    • Renaud, K.1
  • 11
    • 84866496149 scopus 로고    scopus 로고
    • Graphical Passwords: Learning from the First Twelve Years
    • R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical Passwords: Learning from the First Twelve Years," ACM Computing Surveys, vol. 44, no. 4, 2012.
    • (2012) ACM Computing Surveys , vol.44 , Issue.4
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.C.3
  • 13
    • 79958097346 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • J. Bonneau and S. Preibusch, "The password thicket: technical and market failures in human authentication on the web," in Proc. WEIS 2010, 2010.
    • Proc. WEIS 2010, 2010
    • Bonneau, J.1    Preibusch, S.2
  • 14
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau, "The science of guessing: analyzing an anonymized corpus of 70 million passwords," IEEE Symp. Security and Privacy, May 2012.
    • IEEE Symp. Security and Privacy, May 2012
    • Bonneau, J.1
  • 17
    • 65449175738 scopus 로고    scopus 로고
    • Analyzing websites for user-visible security design flaws
    • L. Falk, A. Prakash, and K. Borders, "Analyzing websites for user-visible security design flaws," in ACM SOUPS 2008, pp. 117-126.
    • ACM SOUPS 2008 , pp. 117-126
    • Falk, L.1    Prakash, A.2    Borders, K.3
  • 22
    • 85175131891 scopus 로고    scopus 로고
    • ver. 10.0.2
    • Mozilla Firefox, ver. 10.0.2, www.mozilla.org/.
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, December 1978.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 26
    • 63449115454 scopus 로고    scopus 로고
    • A Taxonomy of Single Sign-On Systems
    • Proc. ACISP 2003, Information Security and Privacy, 8th Australasian Conference. Springer
    • A. Pashalidis and C. J. Mitchell, "A Taxonomy of Single Sign-On Systems," in Proc. ACISP 2003, Information Security and Privacy, 8th Australasian Conference. Springer LNCS 2727, 2003, pp. 249-264.
    • (2003) LNCS , vol.2727 , pp. 249-264
    • Pashalidis, A.1    Mitchell, C.J.2
  • 28
    • 78751558943 scopus 로고    scopus 로고
    • A billion keys, but few locks: The crisis of web single sign-on
    • S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, "A billion keys, but few locks: the crisis of web single sign-on," Proc. NSPW 2010, pp. 61-72.
    • Proc. NSPW 2010 , pp. 61-72
    • Sun, S.-T.1    Boshmaf, Y.2    Hawkey, K.3    Beznosov, K.4
  • 30
    • 81055155529 scopus 로고    scopus 로고
    • Make mine a quadruple: Strengthening the security of graphical one-time pin authentication
    • R. Jhawar, P. Inglesant, N. Courtois, and M. A. Sasse, "Make mine a quadruple: Strengthening the security of graphical one-time pin authentication," in Proc. NSS 2011, pp. 81-88.
    • Proc. NSS 2011 , pp. 81-88
    • Jhawar, R.1    Inglesant, P.2    Courtois, N.3    Sasse, M.A.4
  • 31
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 35
    • 84878346459 scopus 로고    scopus 로고
    • Jun. arstechnica.com/security/news/2011/06/rsa-finally
    • P. Bright, "RSA finally comes clean: SecurID is compromised," Jun. 2011, arstechnica.com/security/news/2011/06/rsa-finally-comes-clean- securid-is-compromised.ars.
    • (2011) RSA Finally Comes Clean: SecurID Is Compromised
    • Bright, P.1
  • 38
    • 33947492044 scopus 로고    scopus 로고
    • From template to image: Reconstructing fingerprints from minutiae points
    • DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
    • A. Ross, J. Shah, and A. K. Jain, "From Template to Image: Reconstructing Fingerprints from Minutiae Points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, 2007. (Pubitemid 46464396)
    • (2007) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 40
    • 33947384963 scopus 로고    scopus 로고
    • Audio-Visual Biometrics
    • P. S. Aleksic and A. K. Katsaggelos, "Audio-Visual Biometrics," Proc. of the IEEE, vol. 94, no. 11, pp. 2025-2044, 2006.
    • (2006) Proc. of the IEEE , vol.94 , Issue.11 , pp. 2025-2044
    • Aleksic, P.S.1    Katsaggelos, A.K.2
  • 42
    • 85175130072 scopus 로고    scopus 로고
    • LastPass, www.lastpass.com/.
  • 43
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the Passport single signon protocol
    • D. P. Kormann and A. D. Rubin, "Risks of the Passport single signon protocol," Computer Networks, vol. 33, no. 1-6, 2000.
    • (2000) Computer Networks , vol.33 , Issue.1-6
    • Kormann, D.P.1    Rubin, A.D.2
  • 44
    • 84855245530 scopus 로고    scopus 로고
    • "Facebook Connect," 2011, www.facebook.com/advertising/? connect.
    • (2011) Facebook Connect
  • 47
    • 38049015008 scopus 로고    scopus 로고
    • Master's thesis, School of Information Technology and Engineering, University of Ottawa, June
    • H. Tao, "Pass-Go, a New Graphical Password Scheme," Master's thesis, School of Information Technology and Engineering, University of Ottawa, June 2006.
    • (2006) Pass-Go, a New Graphical Password Scheme
    • Tao, H.1
  • 49
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • N. Hopper and M. Blum, "Secure human identification protocols," ASIACRYPT 2001, pp. 52-66, 2001.
    • (2001) ASIACRYPT 2001 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 50
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • S. Smith, "Authenticating users by word association," Computers & Security, vol. 6, no. 6, pp. 464-470, 1987.
    • (1987) Computers & Security , vol.6 , Issue.6 , pp. 464-470
    • Smith, S.1
  • 51
    • 85175130951 scopus 로고    scopus 로고
    • Outflanking and securely using the PIN/TAN-System
    • vol. cs.CR/0410025
    • A. Wiesmaier, M. Fischer, E. G. Karatsiolis, and M. Lippert, "Outflanking and securely using the PIN/TAN-System," CoRR, vol. cs.CR/0410025, 2004.
    • (2004) CoRR
    • Wiesmaier, A.1    Fischer, M.2    Karatsiolis, E.G.3    Lippert, M.4
  • 52
    • 85175131739 scopus 로고    scopus 로고
    • "PassWindow," 2011, www.passwindow.com.
    • (2011) PassWindow
  • 53
    • 85175133524 scopus 로고    scopus 로고
    • static.yubico.com/var/uploads/YubiKey-manual-2.0.
    • Yubico, "The YubiKey Manual, v. 2.0," 2009, static.yubico.com/var/uploads/YubiKey-manual-2.0.pdf.
    • (2009) The YubiKey Manual, V. 2.0
  • 54
    • 85175129771 scopus 로고    scopus 로고
    • Ironkey, www.ironkey.com/internet-authentication.
  • 56
    • 85175132872 scopus 로고    scopus 로고
    • Cronto, www.cronto.com/.
  • 58
    • 70449688213 scopus 로고    scopus 로고
    • It's no secret: Measuring the security and reliability of authentication via 'secret' questions
    • S. Schechter, A. J. B. Brush, and S. Egelman, "It's no secret: Measuring the security and reliability of authentication via 'secret' questions," in IEEE Symp. Security and Privacy, 2009, pp. 375-390.
    • IEEE Symp. Security and Privacy, 2009 , pp. 375-390
    • Schechter, S.1    Brush, A.J.B.2    Egelman, S.3
  • 64
    • 84896917008 scopus 로고    scopus 로고
    • On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
    • Q. Yan, J. Han, Y. Li, and H. Deng, "On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability." Proc. NDSS, 2012.
    • Proc. NDSS, 2012
    • Yan, Q.1    Han, J.2    Li, Y.3    Deng, H.4
  • 65
    • 80051962268 scopus 로고    scopus 로고
    • Using Fingerprint Authentication to Reduce System Security: An Empirical Study
    • H. Wimberly and L. M. Liebrock, "Using Fingerprint Authentication to Reduce System Security: An Empirical Study," in IEEE Symp. Security and Privacy, 2011, pp. 32-46.
    • IEEE Symp. Security and Privacy, 2011 , pp. 32-46
    • Wimberly, H.1    Liebrock, L.M.2
  • 66
    • 84967321284 scopus 로고    scopus 로고
    • Risk and morality: Three framing devices
    • R. Ericson and A. Doyle, Eds. University of Toronto Press
    • J. Adams, "Risk and morality: three framing devices," in Risk and Morality, R. Ericson and A. Doyle, Eds. University of Toronto Press, 2003.
    • (2003) Risk and Morality
    • Adams, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.