搜索结果: 1-15 共查到“Passwords”相关记录19条 . 查询时间(0.125 秒)
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
Smartphone Security:Why Doodling Trumps Text Passwords
Smartphone Security Doodling Trumps Text Passwords
2016/3/21
Someday soon, you may be able to log into your smartphone with sweeping gestures or doodling, using one or more fingers.Rutgers University researchers have performed the first study of free-form gestu...
Realizing Pico: Finally No More Passwords!
implementation public-key cryptography authentication
2016/1/8
In 2011 Stajano proposed Pico, a secure and easy-to-use alternative for passwords.
Among the many proposals in this category, Pico stands out by being
creative and convincing. However, the descripti...
Despite more than thirty years of intensive research efforts, textual passwords are still enveloped in mysterious
veils. In this work, we make a substantial step forward in understanding the underlyi...
We introduce quantitative usability and security models to
guide the design of password management schemes — systematic strategies
to help users create and remember multiple passwords. In the same
...
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...
Cyber and Physical Access Control in Legacy System Using Passwords
Password Management Visual Cryptography Mobile Device
2015/12/18
Passwords—secret combinations of symbols—play an important role in
physical world security (e.g. watchword to prevent unauthorized entry into military
forbidden area) from ancient times. With emerge...
Brain's reaction to certain words could replace passwords
Brain's reaction certain words replace passwords
2015/6/18
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to replace pass...
Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords...
Keyboard Acoustic Emanations: An Evaluation of Strong Passwords and Typing Styles
Keyboard acoustic emanations strong passwords signal processing
2010/11/26
The sounds resulting from keyboard typing can reveal information about the input data. In this paper, we revisit such keyboard acoustic emanations for the purpose of eavesdropping over “strong” (rando...
Improving the Security and Flexibility of One-Time Passwords by Signature Chains
authentication hash chain signature chain
2009/7/28
While the classical attack of ``monitor the network and intercept the password'' can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supple...
Optimal Discretization for High-Entropy Graphical Passwords
authentication password security graphical passwords
2009/6/4
In click-based graphical password schemes that allow arbitrary click locations on image,
a click should be verified as correct if it is close within a predefined distance to the originally
chosen lo...
Session-Key Generation using Human Passwords Only
Session-key generation mutual authentication protocols human-memorizable passwords
2009/4/17
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional setup assumption in the network.
Our protocol ...
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Efficient Password-Authenticated Key Exchange Human-Memorable Passwords
2009/4/16
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Three-party key agreement Password Verifier Active adversary
2009/4/3
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed
two new three-party protocols, one for password-based authenticated key agreement
and one for verifier-based authent...