Sciweavers

9503 search results - page 100 / 1901
» Authenticated System Calls
Sort
View
130
Voted
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 10 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
123
Voted
AINA
2009
IEEE
15 years 10 months ago
Advantages of User Authentication Using Unclear Images
— A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the origi...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
JCS
2007
120views more  JCS 2007»
15 years 4 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CHI
2010
ACM
15 years 12 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
CCS
2007
ACM
15 years 11 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...