[go: up one dir, main page]

Monrose, 1999 - Google Patents

Towards Stronger User Authentication

Monrose, 1999

Document ID
17409426329251259218
Author
Monrose N
Publication year

External Links

Snippet

Password-based authentication is the dominant mechanism for verifying the identity of computer users, even though it is well known that people frequently choose passwords that are vulnerable to dictionary attacks. This dissertation addresses the issue of improving the …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
Ballard et al. Forgery quality and its implications for behavioral biometric security
US9921741B2 (en) Motion-based identity authentication of an individual with a communications device
Bartlow et al. Evaluating the reliability of credential hardening through keystroke dynamics
Monrose Towards Stronger User Authentication
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
JP2016526210A5 (en)
Kanade et al. Enhancing information security and privacy by combining biometrics with cryptography
Chenchev et al. Authentication mechanisms and classification: a literature survey
Binbeshr et al. Secure PIN-entry method using one-time PIN (OTP)
Uzun et al. Cryptographic key derivation from biometric inferences for remote authentication
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Hussien et al. Encrypting Text Messages via Iris Recognition and Gaze Tracking Technology
Mahmood et al. Intelligent Gesture-Enhanced Blockchain Voting: A New Era of Secure and Accessible E-Voting
Elftmann Secure alternatives to password-based authentication mechanisms
Lashkari et al. A survey on usability and security features in graphical user authentication algorithms
van Oorschot User authentication—passwords, biometrics and alternatives
Rudrakshi et al. A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem
Mohamad et al. Image based authentication using zero-knowledge protocol
Ballard Robust techniques for evaluating biometric cryptographic key generators
Juels Fuzzy commitment
Teh Using users' touch dynamics biometrics to enhance authentication on mobile devices
Bhargav-Spantzel et al. Biometrics-based identifiers for digital identity management
Malla A Gaze-Based Authentication System: From Authentication to Intrusion Detection
Gao Recent developments on applying biometrics in cryptography
Devaki et al. A novel way of ICON based authentication methods