搜索结果: 1-15 共查到“军队指挥学 passwords”相关记录16条 . 查询时间(0.2 秒)
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
Realizing Pico: Finally No More Passwords!
implementation public-key cryptography authentication
2016/1/8
In 2011 Stajano proposed Pico, a secure and easy-to-use alternative for passwords.
Among the many proposals in this category, Pico stands out by being
creative and convincing. However, the descripti...
Despite more than thirty years of intensive research efforts, textual passwords are still enveloped in mysterious
veils. In this work, we make a substantial step forward in understanding the underlyi...
We introduce quantitative usability and security models to
guide the design of password management schemes — systematic strategies
to help users create and remember multiple passwords. In the same
...
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...
Cyber and Physical Access Control in Legacy System Using Passwords
Password Management Visual Cryptography Mobile Device
2015/12/18
Passwords—secret combinations of symbols—play an important role in
physical world security (e.g. watchword to prevent unauthorized entry into military
forbidden area) from ancient times. With emerge...
Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords...
Keyboard Acoustic Emanations: An Evaluation of Strong Passwords and Typing Styles
Keyboard acoustic emanations strong passwords signal processing
2010/11/26
The sounds resulting from keyboard typing can reveal information about the input data. In this paper, we revisit such keyboard acoustic emanations for the purpose of eavesdropping over “strong” (rando...
Optimal Discretization for High-Entropy Graphical Passwords
authentication password security graphical passwords
2009/6/4
In click-based graphical password schemes that allow arbitrary click locations on image,
a click should be verified as correct if it is close within a predefined distance to the originally
chosen lo...
Session-Key Generation using Human Passwords Only
Session-key generation mutual authentication protocols human-memorizable passwords
2009/4/17
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional setup assumption in the network.
Our protocol ...
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Efficient Password-Authenticated Key Exchange Human-Memorable Passwords
2009/4/16
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Three-party key agreement Password Verifier Active adversary
2009/4/3
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed
two new three-party protocols, one for password-based authenticated key agreement
and one for verifier-based authent...
Simpler Session-Key Generation from Short Random Passwords
Simpler Session-Key Generation Short Random Passwords
2009/3/27
Simpler Session-Key Generation from Short Random Passwords.
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Provable security group key exchange password-based authentication
2009/1/8
Password-authenticated key exchange (PAKE) allows two or multiple parties to share a session key using a human-memorable password only. PAKE has been applied in various environments, especially in the...
We propose a new model for key exchange (KE) based on a
combination of different types of keys. In our setting, servers exchange
keys with clients, who memorize short passwords and carry (stealable)...