Open AccessDOI
The use of passwords for controlling access to remote computer systems and services
Helen M. Wood
- pp 27-27
Reads0
Chats0
TLDR
In this paper, the authors examined the use of passwords for controlled access to remote computer resources and discussed the ways of protecting passwords, and attendant cost considerations, similar similarities between passwords and data encryption keys are noted.Abstract:
The widespread use of remote computer resources has made the problem of personal authentication most urgent. This paper examines the use of passwords for controlled access to these resources. Password techniques, ways of protecting passwords, and attendant cost considerations are discussed. Similarities between passwords and data encryption keys are noted and general recommendations for the use of passwords are presented.read more
Citations
More filters
Journal ArticleDOI
Identity verification through keyboard characteristics
David Umphress,Glen Williams +1 more
TL;DR: A reference profile is built to serve as a basis of comparison for future typing samples and has the capability of providing identity surveillance throughout the entire time at the keyboard.
Authentication Aura - A Distributed Approach to User Authentication
TL;DR: A new approach to identity authentication on mobile devices is proposed based upon a framework that can transparently improve user security confidence, and is based upon the user’s Authentication Aura.
Proceedings Article
Assessing Relative Weights of Authentication Components: An Expert Panel Approach
Factors of Password-based Authentication Research-in-Progress
TL;DR: This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS) in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements.
References
More filters
Journal ArticleDOI
Identity verification through keyboard characteristics
David Umphress,Glen Williams +1 more
TL;DR: A reference profile is built to serve as a basis of comparison for future typing samples and has the capability of providing identity surveillance throughout the entire time at the keyboard.
Authentication Aura - A Distributed Approach to User Authentication
TL;DR: A new approach to identity authentication on mobile devices is proposed based upon a framework that can transparently improve user security confidence, and is based upon the user’s Authentication Aura.
Proceedings Article
Assessing Relative Weights of Authentication Components: An Expert Panel Approach
Factors of Password-based Authentication Research-in-Progress
TL;DR: This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS) in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements.