<--- Back to Details
First PageDocument Content
Computing / Password / SPEKE / Zero-knowledge password proof / Knowledge-based authentication / Passwd / Man-in-the-middle attack / Shadow password / Transport Layer Security / Cryptographic protocols / Cryptography / Security
Date: 2007-09-25 01:00:00
Computing
Password
SPEKE
Zero-knowledge password proof
Knowledge-based authentication
Passwd
Man-in-the-middle attack
Shadow password
Transport Layer Security
Cryptographic protocols
Cryptography
Security

Methods for Knowledge-Based Authentication

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 142,87 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

DocID: 1qZ4T - View Document

Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

DocID: 1m24T - View Document

Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

DocID: 1lY0J - View Document

Computer security / Computer access control / Access control / Federated identity / Identity management / Computer network security / Identity documents / Electronic authentication / Authentication / Multi-factor authentication / Knowledge-based authentication / Password

White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

DocID: 1kMiX - View Document

Identity management / Computer security / Computer access control / Identity / Federated identity / Identity assurance / Authentication / Multi-factor authentication / Knowledge-based authentication / Identity document / Electronic authentication / Identity score

White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

DocID: 1kqNA - View Document