Monrose, 1999 - Google Patents
Towards Stronger User AuthenticationMonrose, 1999
- Document ID
- 17409426329251259218
- Author
- Monrose N
- Publication year
External Links
Snippet
Password-based authentication is the dominant mechanism for verifying the identity of computer users, even though it is well known that people frequently choose passwords that are vulnerable to dictionary attacks. This dissertation addresses the issue of improving the …
- 238000000034 method 0 abstract description 87
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ballard et al. | Forgery quality and its implications for behavioral biometric security | |
US9921741B2 (en) | Motion-based identity authentication of an individual with a communications device | |
Bartlow et al. | Evaluating the reliability of credential hardening through keystroke dynamics | |
Monrose | Towards Stronger User Authentication | |
Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
JP2016526210A5 (en) | ||
Kanade et al. | Enhancing information security and privacy by combining biometrics with cryptography | |
Chenchev et al. | Authentication mechanisms and classification: a literature survey | |
Binbeshr et al. | Secure PIN-entry method using one-time PIN (OTP) | |
Uzun et al. | Cryptographic key derivation from biometric inferences for remote authentication | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
Hussien et al. | Encrypting Text Messages via Iris Recognition and Gaze Tracking Technology | |
Mahmood et al. | Intelligent Gesture-Enhanced Blockchain Voting: A New Era of Secure and Accessible E-Voting | |
Elftmann | Secure alternatives to password-based authentication mechanisms | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
van Oorschot | User authentication—passwords, biometrics and alternatives | |
Rudrakshi et al. | A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
Ballard | Robust techniques for evaluating biometric cryptographic key generators | |
Juels | Fuzzy commitment | |
Teh | Using users' touch dynamics biometrics to enhance authentication on mobile devices | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
Malla | A Gaze-Based Authentication System: From Authentication to Intrusion Detection | |
Gao | Recent developments on applying biometrics in cryptography | |
Devaki et al. | A novel way of ICON based authentication methods |