Madero, 2013 - Google Patents
Password secured systems and negative authenticationMadero, 2013
View PDF- Document ID
- 7642426620285818229
- Author
- Madero A
- Publication year
External Links
Snippet
Today's industry, government, and critical infrastructure are dependent on software systems. In their absence, our modern world would come to a stop. Given our dependence, the mounting cyber threat is of critical concern. In the majority of our systems, passwords are the …
- 230000004044 response 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang-Kennedy et al. | Revisiting password rules: facilitating human management of passwords | |
Houy et al. | Security aspects of cryptocurrency wallets—a systematic literature review | |
Scarfone et al. | Guide to enterprise password management (draft) | |
Grimes | Hacking multifactor authentication | |
Gyunka et al. | Analysis of human factors in cyber security: A case study of anonymous attack on HBGary. | |
Moe et al. | Improved hashing and honey-based stronger password prevention against brute force attack | |
Henricks et al. | On data protection using multi-factor authentication | |
Gupta et al. | Shamir's secret sharing for authentication without reconstructing password | |
Nowroozi et al. | Cryptocurrency wallets: Assessment and security | |
Salutina et al. | Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company | |
Sehgal et al. | Cloud computing and information security | |
Nadji | Data Security, Integrity, and Protection | |
Vugdelija et al. | Review of brute-force attack and protection techniques | |
Madero | Password secured systems and negative authentication | |
Dlamini et al. | Securing cloud computing’s blind-spots using strong and risk-based MFA | |
Sultana et al. | Survey on centric data protection method for cloud storage application | |
Sivaranjani et al. | Graphical Password Authentication using Image Processing (GPAIP) | |
Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
Iordache | Database–Web Interface Vulnerabilities | |
Brintha et al. | Securing banking credentials from SQL injection attacks using AES algorithm | |
Uchnár et al. | Safe user authentication in a network environment | |
Drake et al. | Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution | |
van Oorschot et al. | User authentication—passwords, biometrics and alternatives | |
Apelbaum | User Authentication principles, theory and practice | |
Provos | Bcrypt at 25: A Retrospective on Password Security |