[go: up one dir, main page]

Madero, 2013 - Google Patents

Password secured systems and negative authentication

Madero, 2013

View PDF
Document ID
7642426620285818229
Author
Madero A
Publication year

External Links

Snippet

Today's industry, government, and critical infrastructure are dependent on software systems. In their absence, our modern world would come to a stop. Given our dependence, the mounting cyber threat is of critical concern. In the majority of our systems, passwords are the …
Continue reading at dspace.mit.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
Zhang-Kennedy et al. Revisiting password rules: facilitating human management of passwords
Houy et al. Security aspects of cryptocurrency wallets—a systematic literature review
Scarfone et al. Guide to enterprise password management (draft)
Grimes Hacking multifactor authentication
Gyunka et al. Analysis of human factors in cyber security: A case study of anonymous attack on HBGary.
Moe et al. Improved hashing and honey-based stronger password prevention against brute force attack
Henricks et al. On data protection using multi-factor authentication
Gupta et al. Shamir's secret sharing for authentication without reconstructing password
Nowroozi et al. Cryptocurrency wallets: Assessment and security
Salutina et al. Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company
Sehgal et al. Cloud computing and information security
Nadji Data Security, Integrity, and Protection
Vugdelija et al. Review of brute-force attack and protection techniques
Madero Password secured systems and negative authentication
Dlamini et al. Securing cloud computing’s blind-spots using strong and risk-based MFA
Sultana et al. Survey on centric data protection method for cloud storage application
Sivaranjani et al. Graphical Password Authentication using Image Processing (GPAIP)
Sudha et al. A survey on different authentication schemes in cloud computing environment
Iordache Database–Web Interface Vulnerabilities
Brintha et al. Securing banking credentials from SQL injection attacks using AES algorithm
Uchnár et al. Safe user authentication in a network environment
Drake et al. Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution
van Oorschot et al. User authentication—passwords, biometrics and alternatives
Apelbaum User Authentication principles, theory and practice
Provos Bcrypt at 25: A Retrospective on Password Security