<--- Back to Details
First PageDocument Content
Computing / Password / SPEKE / Zero-knowledge password proof / Knowledge-based authentication / Passwd / Man-in-the-middle attack / Shadow password / Transport Layer Security / Cryptographic protocols / Cryptography / Security
Date: 2007-09-25 01:00:00
Computing
Password
SPEKE
Zero-knowledge password proof
Knowledge-based authentication
Passwd
Man-in-the-middle attack
Shadow password
Transport Layer Security
Cryptographic protocols
Cryptography
Security

Methods for Knowledge-Based Authentication

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 142,87 KB

Share Document on Facebook

Similar Documents

Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

DocID: 1gt0z - View Document

Software / Inode / Ext2 / Ln / Passwd / Symbolic link / Fstab / Shadow password / Filesystem Hierarchy Standard / Unix / Computing / System software

The landscape David Morgan © David Morgan

DocID: 1fCEj - View Document

System software / System administration / Password / Shadow password / Unix security / Information security / Crypt / Password strength / Password cracking / Security / Unix / Computer security

TESTBED Linux SekChek for UNIX Security Report System: Linuxwhite 9 NovemberSekChek IPS

DocID: 18YfG - View Document

Password / Group identifier / User identifier / Shadow password / Passwd / Filesystem permissions / Unix security / Unix / System software / Software

Rating Against Industry Average X

DocID: 18D6v - View Document

System software / Computing / Software / Cryptographic software / Cryptography / Privileged password management / Shadow password / Password / User / Su

National Drug Treatment Monitoring System (NDTMS) NDTMS Drug and Alcohol Monitoring System (DAMS) Regional User Guide Updated:

DocID: 18Bru - View Document