[go: up one dir, main page]

Furnell, 2005 - Google Patents

Authenticating ourselves: will we ever escape the password?

Furnell, 2005

Document ID
12218608096724795625
Author
Furnell S
Publication year
Publication venue
Network Security

External Links

Snippet

Computer systems face continually evolving threats but one bugbear that just won't go away is the vulnerabilities that arise through using passwords for authentication. Passwords have haunted infosecurity professionals since before 1979 and yet they still appear without fail in …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Similar Documents

Publication Publication Date Title
Golla et al. Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns
US8812861B2 (en) Graphical image authentication and security system
Furnell et al. Authentication and supervision: A survey of user attitudes
Sasse Usability and trust in information systems
Herbert et al. A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries
Hoonakker et al. Password authentication from a human factors perspective: Results of a survey among end-users
Karim et al. UIPA: User authentication method based on user interface preferences for account recovery process
Furnell Authenticating ourselves: will we ever escape the password?
Nath et al. Issues and challenges in two factor authentication algorithms
Hayashi et al. WebTicket: Account management using printable tokens
Smart Improving remote identity authentication for consumers and financial institutions
Furnell et al. Biometrics: no silver bullets
Althobaiti et al. Usable security of authentication process: New approach and practical assessment
Sabater Biometrics as password alternative
George Precautions for safe use of internet banking: Scale development and validation
Lott Improving customer authentication
Khan Enhancing User Trust in FinTech: A Multi-Factor Authentication Study.
Morris To Be, To Have, To Know: Smart Ledgers & Identity Authentication
Marnell et al. Towards a model of factors affecting resistance to using multi-method authentication systems in higher-education environments
Rawal et al. Manage the Identification and Authentication of People, Devices, and Services
Salami et al. AN EMPIRICAL SURVEY TO SUBSTANTIATE THE NEED FOR IMPROVEMENT IN USER SECURITY AWARENESS IN MOBILE BANKING IN NIGERIA
Evans et al. Private key infrastructure: balancing computer transmission privacy with changing technology and security demands
Gurushankar et al. Issues, Challenges in E-Banking: Case Study
Alkhalifah et al. The role of Identity Management Systems in enhancing protection of user privacy
SCHAEWITZ et al. A World Full of Privacy and Security (Mis) conceptions? Findings of a Representative Survey in 12 Countries