McDonald et al., 1995 - Google Patents
One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication.McDonald et al., 1995
View PDF- Document ID
- 1092970804861939695
- Author
- McDonald D
- Atkinson R
- Metz C
- et al.
- Publication year
- Publication venue
- USENIX Security Symposium
External Links
Snippet
Abstract The US Naval Research Laboratory's OPIE (Onetime Passwords In Everything) Software Distribution is an enhancement of Bellcore's S/KeyTM 1.0 package. OPIE improves on S/Key in several areas, including FTP service with one-time passwords, and a stronger …
- 230000004044 response 0 description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kemmerer | Cybersecurity | |
Loscocco et al. | The inevitability of failure: The flawed assumption of security in modern computing environments | |
JP3466025B2 (en) | Method and apparatus for protecting masquerade attack in computer network | |
Marpaung et al. | Survey on malware evasion techniques: State of the art and challenges | |
Farmer et al. | Improving the security of your site by breaking into it | |
Parampalli et al. | A practical mimicry attack against powerful system-call monitors | |
US20100287382A1 (en) | Two-factor graphical password for text password and encryption key generation | |
McDonald et al. | One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication. | |
Xu et al. | Data-provenance verification for secure hosts | |
Krawiecka et al. | Safekeeper: Protecting web passwords using trusted execution environments | |
WO2014049027A1 (en) | Network security | |
CN114745202A (en) | Method for actively defending web attack and web security gateway based on active defense | |
Bugiel et al. | TruWalletM: Secure web authentication on mobile platforms | |
Everything et al. | Salt Lake City, Utah, June 1995. | |
Foo et al. | Mobile agents for computer intrusion detection | |
Hindocha | Threats to instant messaging | |
Snow et al. | Simple authentication | |
Langer et al. | Aspects of computer security: A primer | |
Liu et al. | A trusted integrity measurement architecture for securing enterprise network | |
Endsuleit et al. | A security analysis on jade (-s) v. 3.2 | |
Baker et al. | Assurance: the power behind PCASSO security. | |
Reid | Plugging the holes in host-based authentication | |
Tian et al. | Securing ARP from the ground up | |
Harrison et al. | A protocol layer survey of network security | |
Cherckesova et al. | The development of countermeasures against session hijacking |