Novel security techniques for online systems
Communications of the ACM
ACM SIGSAC Review
UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
ACM SIGSAC Review
Communications of the ACM
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Easily remembered passphrases: a better approach
ACM SIGSAC Review - Resources: part II
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Hi-index | 48.25 |
A superset of the secondary passwords technique, pass-algorithms provide enormous flexibility and ease of implementation and represent an attractive alternative to more costly systems security features and equipment. The method validates users who demonstrate knowledge of a secret algorithm rather than a password.