Operating systems principles (2nd ed.)
Operating systems principles (2nd ed.)
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
Password authentication with insecure communication
Communications of the ACM
Password security: a case history
Communications of the ACM
Time Sharing Computer Systems
ACM SIGSAC Review
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
Correct horse battery staple: exploring the usability of system-assigned passphrases
Proceedings of the Eighth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
As lay persons' use of information processing equipment increases, systems' accurate verification of a user's identity becomes a matter of growing concern. Prime considerations are:1. People must be prevented from convincing the system that they are someone else.2. The system must properly accept persons' accurate statements of their identities.3. Verification procedures must impose a minimal burden on lay users.4. Costs of verification must be reasonable. [9, 10, 11, 13, 19]