InfraSec '02 Proceedings of the International Conference on Infrastructure Security
AuthenLink: a user-centred authentification system for a secure mobile com
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
Protecting cryptographic keys and computations via virtual secure coprocessing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Architecture for Protecting Critical Secrets in Microprocessors
Proceedings of the 32nd annual international symposium on Computer Architecture
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Secure Internet Banking Authentication
IEEE Security and Privacy
Security and usability: the case of the user authentication methods
IHM '06 Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine
Preventing the capture of sensitive information
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Ethical hacking and password cracking: a pattern for individualized security exercises
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A biologically inspired password authentication system
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
On the design and implementation of a secure online password vault
Proceedings of the 2009 International Conference on Hybrid Information Technology
The use of geospatial information in securing modern mobile architectures
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application
A survey of passwords from 2007 to 2009
2009 Information Security Curriculum Development Conference
The security of cryptographic hashes
Proceedings of the 49th Annual Southeast Regional Conference
Smart devices for next generation mobile services
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
How much assurance does a PIN provide?
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
FORBAC: a flexible organisation and role-based access control model for secure information systems
ADVIS'06 Proceedings of the 4th international conference on Advances in Information Systems
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
Protection aspects of iconic passwords on mobile devices
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Computer access control is an ongoing challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication to confidently associate an identity with a person. Authentication: From Passwords to Public Keys gives readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying identity are executed. Authentication is one of the basic building blocks of security. To allow a computer system to distinguish between legitimate users and others, most sites give passwords to authorized users. Unfortunately, just as car thieves have found ways to defeat sophisticated locks and alarms, computer hackers are always finding new ways to circumvent password systems. The good news is that organizations now have available to them a broad range of alternatives to passwords, and a variety of ways to make passwords safer. A well-designed authentication system allows users to prove their identities conveniently and gain access to the network without threatening the safety of the organization. The first of its kind, Authentication describes the entire range of authentication methods used today. It examines situations in which certain techniques fail and points out ways to strengthen them. Network professionals, designers, developers, administrators, planners, and managers will find in these pages the authentication strategy to protect their valuable systems. Through diagrams and examples, the author thoroughly explains the technical concepts behind authentication, focusing on existing, off-the-shelf solutions to security problems. Authentication highlights real products and solutions. If you are a network professional searching for the how and why of computer authentication, this is the book that will help you prevent unauthorized access on your network.