Sciweavers

920 search results - page 17 / 184
» Selecting Secure Passwords
Sort
View
142
Voted
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
15 years 7 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
ESORICS
2007
Springer
15 years 9 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
APCSAC
2001
IEEE
15 years 9 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
127
Voted
CHI
2008
ACM
16 years 5 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
ACSAC
2008
IEEE
15 years 11 months ago
On Purely Automated Attacks and Click-Based Graphical Passwords
We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focu...
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oo...