Authentication: From Passwords to Public Keys
This volume examines techniques for contemporary authentication methods for computer access control and security passwords, and also looks at how to choose the best authentication method for any given situation. It starts with a simple case study of a single workstation, and works its way up to more elaborate situations involving networks and remote access.
44 pages matching random in this book
Results 1-3 of 44
What people are saying - Write a review
We haven't found any reviews in the usual places.
access control administrators algorithm Attack Description authentication server authentication system average attack space base secret biometric bits browser Cathy Cathy's certificate authority challenge response Chapter client connection copy crack cryptographic database decrypt Defense described device dictionary attacks digital signature encryption key example Figure fingerprint guess hardware hashed password host indirect authentication Internet John Kerberos lock login mail server Masquerade master key match memorized Microsoft nonce Note off-line one-time password passphrase password file password hash password token pattern person physical plaintext private key problem procedure proprietor protect protocol public key certificate public key cryptography random replay retrieve risk SafeWord secret key Section session key shared secret smart card sniffing software token someone sophisticated stored strategy techniques ticket Tim's timesharing tion Unix user name user's vendors verify Windows NT word workstation