<--- Back to Details
First PageDocument Content
Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security
Date: 2008-12-04 05:05:52
Security
Password
Challenge-response authentication
Digest access authentication
Secure Remote Password protocol
Man-in-the-middle attack
Zero-knowledge proof
OTPW
Security token
Cryptography
Cryptographic protocols
Computer security

Add to Reading List

Source URL: drmlab.org

Download Document from Source Website

File Size: 645,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

DocID: 1qnKy - View Document

Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

DocID: 1lTzP - View Document

Computer access control / Computer security / Access control / Identity management / Cryptographic software / Cryptography / Federated identity / Password / Salt / LastPass / OTPW / Single sign-on

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

DocID: 1lbkU - View Document

Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

DocID: 1aQ6c - View Document

Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

DocID: 1ahh2 - View Document