Authentication Attacks

A Vishnoi - Security Incidents & Response Against Cyber Attacks, 2021 - Springer
Internet is known as an amazing stage that changes the manner in which we impart and
perform business exchanges in current technology. It has now contacted each part of our …

Risk and law in authentication

PR Schapper, M Rivolta, JV Malta - … Evidence & Elec. Signature L. Rev., 2006 - HeinOnline
Until recently it seemed that lawyers and technologists were evolving some sort of
consensus about on-line authentication. This consensus was, however, by no means …

[图书][B] Identities and authentication

FC Piper, MJB Robshaw, S Schwiderski-Grosche - 2004 - researchgate.net
As the automation of business and the use of electronic forms of communication increases,
we are challenged with finding equivalents to such basic security and crime prevention …

[PDF][PDF] IS THAT REALLY YOU? A DISCUSSION OF AUTHENTICATION TECHNIQUES

MD Mayberry - egrove.olemiss.edu
With privacy and security continu ing to dominate the news, the issue of authentication is
making more head lines than ever before. Whether we understand the finer points, most of …

The future of authentication

D Balfanz, R Chow, O Eisen, M Jakobsson… - IEEE Security & …, 2012 - ieeexplore.ieee.org
As part of this special issue on authentication, guest editors Richard Chow, Markus
Jakobsson, and Jesus Molina put together a roundtable discussion with leaders in the field …

Are Security Standards the New Legislation?

C King - Computer Fraud & Security, 2002 - Elsevier
The Internet has become the Wild Wild West of business. The benefits of increased revenue
and reduced costs have to be weighed against the risks associated with the lawlessness of …

[图书][B] Introduction To Cryptography And Network Security

V Geetha, P Singh, NS Patil, SSS Reddy - 2023 - books.google.com
Over the last several years, there have been two key shifts in how much emphasis a
business places on the information security. Before the broad availability of data processing …

[PDF][PDF] A Study on the Security of Authentication Systems

O Umoren, H Marco-Gisbert - academia.edu
In the age of digitalization, passwords play a significant role to protect user information. The
growing number of data breaches has become a major problem allowing unauthorised …

Is Certification a Viable Option?

E Wales - Computer Fraud & Security, 2002 - Elsevier
Not so long ago the implementation of security technology was viewed by outsiders as a
black art, characterized by mumbo jumbo which only those few in the know understood. But …

Tales from the crypt

D Hayward - Computers & Security, 1996 - infona.pl
Electronic identities are frighteningly easy to assume. A skilled hacker can take control of a
genuine user account or pose as a user by creating convincing copies of that person's or …