The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Time Sharing Computer Systems
An experimental application of cryptography to a remotely accessed data system
ACM '72 Proceedings of the ACM annual conference - Volume 1
ACM SIGSAC Review
Proceedings of CRYPTO 84 on Advances in cryptology
On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Experiences with the Amoeba distributed operating system
Communications of the ACM
CRYPTO '89 Proceedings on Advances in cryptology
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
MULTISAFE—a modular multiprocessing approach to secure database management
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Password authentication with insecure communication
Communications of the ACM
The development of a distributed capability system for VLOS
CRPIT '02 Proceedings of the seventh Asia-Pacific conference on Computer systems architecture
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Easy entry: the password encryption problem
ACM SIGOPS Operating Systems Review
Some cryptographic principles of authentication in electronic funds transfer systems
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Some Open Problems In Cryptography
ACM '78 Proceedings of the 1978 annual conference
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
Partitions and principles for secure operating systems
ACM '75 Proceedings of the 1975 annual conference
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
On improvements to password security
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Multiuser cryptographic techniques
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Computers, security, and the audit function
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Information Sciences: an International Journal
Usability of display-equipped RFID tags for security purposes
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Using automated banking certificates to detect unauthorised financial transactions
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Applications of SAT solvers to cryptanalysis of hash functions
SAT'06 Proceedings of the 9th international conference on Theory and Applications of Satisfiability Testing
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
Research note: Remote password authentication scheme based on cross-product
Computer Communications
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 48.25 |
In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password with one recorded in a Password Table which is available to only the authentication program. The integrity of the system depends on keeping the table secret. In this paper a password scheme is presented which does not require secrecy in the computer. All aspects of the system, including all relevant code and data bases, may be known by anyone attempting to intrude.The scheme is based on using a function H which the would-be intruder is unable to invert. This function is applied to the user's password and the result compared to a table entry, a match being interpreted as authentication of the user. The intruder may know all about H and have access to the table, but he can penetrate the system only if he can invert H to determine an input that produces a given output.This paper discusses issues surrounding selection of a suitable H. Two different plausible arguments are given that penetration would be exceedingly difficult, and it is then argued that more rigorous results are unlikely. Finally, some human engineering problems relating to the scheme are discussed.