Sciweavers

65 search results - page 1 / 13
» Methods for Protecting Password Transmission
Sort
View
COMPSEC
2000
117views more  COMPSEC 2000»
13 years 10 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
IJMMS
2007
103views more  IJMMS 2007»
13 years 10 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
WWW
2007
ACM
14 years 11 months ago
A password stretching method using user specific salts
In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
ChangHee Lee, Heejo Lee
AINA
2008
IEEE
14 years 25 days ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
CHI
2008
ACM
14 years 11 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle