[go: up one dir, main page]

Abadi et al., 1997 - Google Patents

Strengthening passwords

Abadi et al., 1997

View PDF
Document ID
14908341314932191363
Author
Abadi M
Lomas T
Needham R
Publication year

External Links

Snippet

Despite their notorious vulnerability, traditional passwords remain important for security. In this paper we describe a method for strengthening passwords. Our method does not require users to memorize or to write down long passwords, and does not rely on smart-cards or …
Continue reading at shiftleft.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Abadi et al. Strengthening passwords
US8966276B2 (en) System and method providing disconnected authentication
Schneier et al. Cryptographic support for secure logs on untrusted machines.
EP0848315B1 (en) Securely generating a computer system password by utilizing an external encryption algorithm
Schneier et al. Secure audit logs to support computer forensics
US6950523B1 (en) Secure storage of private keys
US7596704B2 (en) Partition and recovery of a verifiable digital secret
US6230269B1 (en) Distributed authentication system and method
US7058806B2 (en) Method and apparatus for secure leveled access control
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
JP2024511236A (en) Computer file security encryption method, decryption method and readable storage medium
Hoover et al. Software smart cards via cryptographic camouflage
CN110837634B (en) Electronic signature method based on hardware encryption machine
Ku A hash-based strong-password authentication scheme without using smart cards
Chen et al. Offline dictionary attack on TCG TPM weak authorisation data, and solution
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
Harn et al. Integration of user authentication and access control
Kwon et al. Efficient key exchange and authentication protocols protecting weak secrets
Gaskell et al. Integrating smart cards into authentication systems
ABIRAMI et al. STRENGTHENING CLOUD SERVER SECURITY: MULTI-AUTHORITY PRIVACY-PRESERVING WITH AES-256 ENCRYPTION AND SHA-512.
Zhu et al. Improvement upon mutual password authentication scheme
EP4546705A1 (en) System and method for providing keyless encryption and decryption
WO2025013085A1 (en) Invisible zerobyte data security technology, and add on os with virtual invisible partitions
Pandya et al. A steganographic approach to mitigate password attacks
Bhujade et al. A Survey on Basics of Cryptography