scispace - formally typeset
Open AccessDOI

The use of passwords for controlling access to remote computer systems and services

Reads0
Chats0
TLDR
In this paper, the authors examined the use of passwords for controlled access to remote computer resources and discussed the ways of protecting passwords, and attendant cost considerations, similar similarities between passwords and data encryption keys are noted.
Abstract
The widespread use of remote computer resources has made the problem of personal authentication most urgent. This paper examines the use of passwords for controlled access to these resources. Password techniques, ways of protecting passwords, and attendant cost considerations are discussed. Similarities between passwords and data encryption keys are noted and general recommendations for the use of passwords are presented.

read more

Citations
More filters
Journal ArticleDOI

Identity verification through keyboard characteristics

TL;DR: A reference profile is built to serve as a basis of comparison for future typing samples and has the capability of providing identity surveillance throughout the entire time at the keyboard.

Authentication Aura - A Distributed Approach to User Authentication

TL;DR: A new approach to identity authentication on mobile devices is proposed based upon a framework that can transparently improve user security confidence, and is based upon the user’s Authentication Aura.

Factors of Password-based Authentication Research-in-Progress

TL;DR: This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS) in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements.
References
More filters
Journal ArticleDOI

Identity verification through keyboard characteristics

TL;DR: A reference profile is built to serve as a basis of comparison for future typing samples and has the capability of providing identity surveillance throughout the entire time at the keyboard.

Authentication Aura - A Distributed Approach to User Authentication

TL;DR: A new approach to identity authentication on mobile devices is proposed based upon a framework that can transparently improve user security confidence, and is based upon the user’s Authentication Aura.

Factors of Password-based Authentication Research-in-Progress

TL;DR: This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS) in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements.