Leveraging personal devices for stronger password authentication from untrusted computers
M Mannan, PC van Oorschot - Journal of Computer Security, 2011 - content.iospress.com
Internet authentication for popular end-user transactions, such as online banking and e-
commerce, continues to be dominated by passwords entered through end-user PCs. Most …
commerce, continues to be dominated by passwords entered through end-user PCs. Most …
Password-based authentication
B Nugent - ACM SIGSAC Review, 1987 - dl.acm.org
The people who invented computer passwords obviously never met Charlie Fox. During my
high school years, I worked Saturdays and Summers at Hampton General Store, in the small …
high school years, I worked Saturdays and Summers at Hampton General Store, in the small …
Rethinking passwords
W Cheswick - Communications of the ACM, 2013 - dl.acm.org
Rethinking passwords Page 1 40 communicaTionS of The acm | february 2013 | vol. 56 | no. 2
practice there is aN authentication plague upon the land. We have to claim and assert our …
practice there is aN authentication plague upon the land. We have to claim and assert our …
Strengthening password-based authentication
Even with years of research into new authentication technologies, passwords still dominate
the authentication landscape. This is due primarily to a combination of security …
the authentication landscape. This is due primarily to a combination of security …
Using a personal device to strengthen password authentication from an untrusted computer
M Mannan, PC Van Oorschot - International Conference on Financial …, 2007 - Springer
Keylogging and phishing attacks can extract user identity and sensitive account information
for unauthorized access to users' financial accounts. Most existing or proposed solutions are …
for unauthorized access to users' financial accounts. Most existing or proposed solutions are …
PGP Auth: Using Public Key Encryption for Authentication on the Web
D Wueppelmann - 2015 - repository.library.carleton.ca
The majority of authentication systems use text passwords, as they provide a flexible method
of authenticating on a wide variety of devices. Unfortunately, having suffi-ciently strong …
of authenticating on a wide variety of devices. Unfortunately, having suffi-ciently strong …
Getting web authentication right a best-case protocol for the remaining life of passwords
J Bonneau - International Workshop on Security Protocols, 2011 - Springer
We outline an end-to-end password authentication protocol for the web designed to be
stateless and as secure as possible given legacy limitations of the web browser and …
stateless and as secure as possible given legacy limitations of the web browser and …
Rethinking Passwords: Our authentication system is lacking. Is improvement possible?
W Cheswick - Queue, 2012 - dl.acm.org
There is an authentication plague upon the land. We have to claim and assert our identity
repeatedly to a host of authentication trolls, each jealously guarding an Internet service of …
repeatedly to a host of authentication trolls, each jealously guarding an Internet service of …
[图书][B] Towards Stronger User Authentication
NF Monrose - 1999 - search.proquest.com
Password-based authentication is the dominant mechanism for verifying the identity of
computer users, even though it is well known that people frequently choose passwords that …
computer users, even though it is well known that people frequently choose passwords that …
[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …
deployed on the Internet. Our study included 150 websites which offer free user accounts for …