[图书][B] Computer science handbook
AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
[图书][B] Authentication: from passwords to public keys
RE Smith - 2001 - dl.acm.org
Computer access control is an ongoing challenge. Left to themselves, computers tend to
treat one user no differently than another. Computers use authentication to confidently …
treat one user no differently than another. Computers use authentication to confidently …
Human selection of mnemonic phrase-based passwords
C Kuo, S Romanosky, LF Cranor - … of the second symposium on Usable …, 2006 - dl.acm.org
Textual passwords are often the only mechanism used to authenticate users of a networked
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
Guessing human-chosen secrets
J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …
despite decades of effort. Although the security research community has explored dozens of …
[PDF][PDF] Authentication, Access Controls, and Intrusion Detection.
RS Sandhu, P Samarati - The Computer Science and Engineering …, 1997 - Citeseer
An important requirement of any information management system is to protect information
against improper disclosure or modi cation (known as con dentiality and integrity …
against improper disclosure or modi cation (known as con dentiality and integrity …
Analyzing user password selection behavior for reduction of password space
RV Yampolskiy - Proceedings 40th annual 2006 international …, 2006 - ieeexplore.ieee.org
This paper presents a comprehensive survey of recent literature on the topic of password
dictionaries for alphanumeric and graphical user authentication approaches including some …
dictionaries for alphanumeric and graphical user authentication approaches including some …
A comparative study of three random password generators
MD Leonhard… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
This paper compares three random password generation schemes, describing and
analyzing each. It also reports the results of a small study testing the quality of the …
analyzing each. It also reports the results of a small study testing the quality of the …
An empirical analysis on the usability and security of passwords
Security and usability are two essential aspects of a system, but they usually move in
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …
Locimotion: Towards learning a strong authentication secret in a single session
In this work, we design and evaluate LociMotion, a training interface to learn a strong
authentication secret in a single session. LociMotion automatically takes a random …
authentication secret in a single session. LociMotion automatically takes a random …