Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Time Sharing Computer Systems
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Fast "infinite-key" privacy transformation for resource-sharing systems
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Multi-dimensional security program for a generalized information retrieval system
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Computer abuse perpetrators and vulnerabilities of computer systems
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
A secure, national system for electronic funds transfer
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Advances in the keystroke dynamics: the practical impact of database quality
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.00 |
The widespread use of remote computer resources has made the problem of personal authentication most urgent. This paper examines the use of passwords for controlled access to these resources. Password techniques, ways of protecting passwords, and attendant cost considerations are discussed. Similarities between passwords and data encryption keys are noted and general recommendations for the use of passwords are presented.