Challengeresponse authentication

Results: 50



#Item
21Cryptography / ISO standards / Ubiquitous computing / Computer security / Prevention / Computer access control / Password / Contactless smart card / Challengeresponse authentication / Key-agreement protocol / Smart card / Key

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
22Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
23Cryptography / Computer access control / Security / Password / Biometrics / Speaker recognition / Computer security / Authentication / Challengeresponse authentication / Key / Password policy / Password manager

HCI and Security Systems Andrew Patrick National Research Council of Canada 1200 Montreal Rd. Ottawa, ON K1A 0R6

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:46
24Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
25Cryptography / Security / Crime prevention / Information governance / National security / Password / Challengeresponse authentication / Information security / Computer security / Password policy / Password strength

Human Factors Considerations for User Identification on Air Traffic Control Systems Kenneth Allendoerfer Shantanu Pai

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:19
26Computer access control / Authentication / Gesture / Password / Challengeresponse authentication

H4Plock: Supporting Mobile User Authentication through Gestural Input and Tactile Output Abdullah Ali and Ravi Kuber Adam J. Aviv

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:20
27Cryptography / Computer access control / Password / Security / Salt / Crypt / Challengeresponse authentication / Security token / Password synchronization / Password fatigue

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-08-12 08:57:24
28Password / Security / Challengeresponse authentication / Self-service password reset / Password policy

Setting Account Preferences CompenSessation Setting Up Account Preferences Depending on how your organization configures FermiWorks, you can edit a variety of features on your account, including languages, search functio

Add to Reading List

Source URL: fermiworks.fnal.gov

Language: English
29Computer access control / Password / Security token / Phishing / Authentication / Challengeresponse authentication / Self-service password reset / Multi-factor authentication

Educated Guess on Graphical Authentication Schemes: Vulnerabilities and Countermeasures Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:07:47
30Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
UPDATE