A survey of password mechanisms: Weaknesses and potential improvements. Part 1
- 1 November 1989
- journal article
- Published by Elsevier in Computers & Security
- Vol. 8 (7), 587-604
- https://doi.org/10.1016/0167-4048(89)90051-5
Abstract
No abstract availableThis publication has 45 references indexed in Scilit:
- With microscope and tweezers: an analysis of the Internet virus of November 1988Published by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The password predictor—a training aid for raising security awarenessComputers & Security, 1988
- Identity verification (authentication) working groupACM SIGSAC Review, 1988
- Strategies for extending the useful lifetime of DESComputers & Security, 1987
- Verifying the authentication of an information system userComputers & Security, 1987
- Password breakingComputer Fraud & Security Bulletin, 1984
- Bypassing the passwords?Computer Fraud & Security Bulletin, 1983
- Computer crime insurance — the tangled webComputer Fraud & Security Bulletin, 1981
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974