Abadi et al., 1997 - Google Patents
Strengthening passwordsAbadi et al., 1997
View PDF- Document ID
- 14908341314932191363
- Author
- Abadi M
- Lomas T
- Needham R
- Publication year
External Links
Snippet
Despite their notorious vulnerability, traditional passwords remain important for security. In this paper we describe a method for strengthening passwords. Our method does not require users to memorize or to write down long passwords, and does not rely on smart-cards or …
- 238000005728 strengthening 0 title abstract description 19
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Abadi et al. | Strengthening passwords | |
| US8966276B2 (en) | System and method providing disconnected authentication | |
| Schneier et al. | Cryptographic support for secure logs on untrusted machines. | |
| EP0848315B1 (en) | Securely generating a computer system password by utilizing an external encryption algorithm | |
| Schneier et al. | Secure audit logs to support computer forensics | |
| US6950523B1 (en) | Secure storage of private keys | |
| US7596704B2 (en) | Partition and recovery of a verifiable digital secret | |
| US6230269B1 (en) | Distributed authentication system and method | |
| US7058806B2 (en) | Method and apparatus for secure leveled access control | |
| US10158613B1 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
| JP2024511236A (en) | Computer file security encryption method, decryption method and readable storage medium | |
| Hoover et al. | Software smart cards via cryptographic camouflage | |
| CN110837634B (en) | Electronic signature method based on hardware encryption machine | |
| Ku | A hash-based strong-password authentication scheme without using smart cards | |
| Chen et al. | Offline dictionary attack on TCG TPM weak authorisation data, and solution | |
| US10623384B2 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
| Harn et al. | Integration of user authentication and access control | |
| Kwon et al. | Efficient key exchange and authentication protocols protecting weak secrets | |
| Gaskell et al. | Integrating smart cards into authentication systems | |
| ABIRAMI et al. | STRENGTHENING CLOUD SERVER SECURITY: MULTI-AUTHORITY PRIVACY-PRESERVING WITH AES-256 ENCRYPTION AND SHA-512. | |
| Zhu et al. | Improvement upon mutual password authentication scheme | |
| EP4546705A1 (en) | System and method for providing keyless encryption and decryption | |
| WO2025013085A1 (en) | Invisible zerobyte data security technology, and add on os with virtual invisible partitions | |
| Pandya et al. | A steganographic approach to mitigate password attacks | |
| Bhujade et al. | A Survey on Basics of Cryptography |