Leveraging personal devices for stronger password authentication from untrusted computers

M Mannan, PC van Oorschot - Journal of Computer Security, 2011 - content.iospress.com
Internet authentication for popular end-user transactions, such as online banking and e-
commerce, continues to be dominated by passwords entered through end-user PCs. Most …

Password-based authentication

B Nugent - ACM SIGSAC Review, 1987 - dl.acm.org
The people who invented computer passwords obviously never met Charlie Fox. During my
high school years, I worked Saturdays and Summers at Hampton General Store, in the small …

Rethinking passwords

W Cheswick - Communications of the ACM, 2013 - dl.acm.org
Rethinking passwords Page 1 40 communicaTionS of The acm | february 2013 | vol. 56 | no. 2
practice there is aN authentication plague upon the land. We have to claim and assert our …

Strengthening password-based authentication

S Ruoti, J Andersen, K Seamons - Twelfth Symposium on Usable …, 2016 - usenix.org
Even with years of research into new authentication technologies, passwords still dominate
the authentication landscape. This is due primarily to a combination of security …

Using a personal device to strengthen password authentication from an untrusted computer

M Mannan, PC Van Oorschot - International Conference on Financial …, 2007 - Springer
Keylogging and phishing attacks can extract user identity and sensitive account information
for unauthorized access to users' financial accounts. Most existing or proposed solutions are …

PGP Auth: Using Public Key Encryption for Authentication on the Web

D Wueppelmann - 2015 - repository.library.carleton.ca
The majority of authentication systems use text passwords, as they provide a flexible method
of authenticating on a wide variety of devices. Unfortunately, having suffi-ciently strong …

Getting web authentication right a best-case protocol for the remaining life of passwords

J Bonneau - International Workshop on Security Protocols, 2011 - Springer
We outline an end-to-end password authentication protocol for the web designed to be
stateless and as secure as possible given legacy limitations of the web browser and …

Rethinking Passwords: Our authentication system is lacking. Is improvement possible?

W Cheswick - Queue, 2012 - dl.acm.org
There is an authentication plague upon the land. We have to claim and assert our identity
repeatedly to a host of authentication trolls, each jealously guarding an Internet service of …

[图书][B] Towards Stronger User Authentication

NF Monrose - 1999 - search.proquest.com
Password-based authentication is the dominant mechanism for verifying the identity of
computer users, even though it is well known that people frequently choose passwords that …

[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.

J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …