期刊文献+

一种新的混合式身份认证技术 被引量:2

A New Technology of Composite Authentication
下载PDF
导出
摘要 系统资源的安全与访问者的身份认证有着直接的关系,目前绝大多数系统的身份 认证是基于常规口令的,由于人本身的因素使常规口令并不安全,因此在常规口令的基础上 结合人对图像很容易识别的现象提出半可视化口令保护技术?这种技术使系统用户免去记忆 枯燥的常规口令的麻烦基础上提高口令的记忆效率和安全性?给出了相关的定义和认证过程 。 There is a direct relation between the resource of system and users authentication, but the authentication of the most systems is based on passwords . Because of the factors of human, the passwords are not secure. So the paper pu ts forward HVP(half visual passwords) based on traditional passwords and based o n humans limitless ability on recognition of image. This kind of password can fr ee the user from the trouble of remembering meaningless traditional passwords an d improve efficiency of remembering and security. The paper gives the definition and authentication process of HVP. It also examines the HVP and it is shown tha t the HVP is easier to recall and is security.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第11期105-107,共3页 Computer Engineering
基金 国家高技术研究发展计划项目(2001AA412260) 四川省重点科技项目(01GG012-0 1)
关键词 常规口令 可视化哈希 可视化口令 半可视化口令 Traditional passwords Hash visualization Visual passwords Half v isual passwords
  • 相关文献

参考文献4

  • 1Haller N, The S/KEYTM One-Time Password System, Proceedings of the ISOC Symposium on Network and Distributed System Security,San Dielzo, CA, 1994:151-157.
  • 2Dhamija R, Perrig A, Vu D. A User Study Using Images for Authentication. In proceedings of the 9th Usenix Security Symposium, 2000.
  • 3Perrig A, Song D. Hash Visualization: A New Technique to Improve Real-world Security. In Proceedings of the 1999 International Work- shop on Cryptographic Techniques and E-commerce (CryTEC99), 1999.
  • 4Schneier B. Applied Cryptography Second Edition: Protocols,Algorithms, and Source Code in C. Wiley & Sons Inc., 1996.

同被引文献4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部