McDonald et al., 1995 - Google Patents

One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication.

McDonald et al., 1995

View PDF
Document ID
1092970804861939695
Author
McDonald D
Atkinson R
Metz C
et al.
Publication year
Publication venue
USENIX Security Symposium

External Links

Snippet

Abstract The US Naval Research Laboratory's OPIE (Onetime Passwords In Everything) Software Distribution is an enhancement of Bellcore's S/KeyTM 1.0 package. OPIE improves on S/Key in several areas, including FTP service with one-time passwords, and a stronger …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kemmerer Cybersecurity
Loscocco et al. The inevitability of failure: The flawed assumption of security in modern computing environments
JP3466025B2 (en) Method and apparatus for protecting masquerade attack in computer network
Marpaung et al. Survey on malware evasion techniques: State of the art and challenges
Farmer et al. Improving the security of your site by breaking into it
Parampalli et al. A practical mimicry attack against powerful system-call monitors
US20100287382A1 (en) Two-factor graphical password for text password and encryption key generation
McDonald et al. One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication.
Xu et al. Data-provenance verification for secure hosts
Krawiecka et al. Safekeeper: Protecting web passwords using trusted execution environments
WO2014049027A1 (en) Network security
CN114745202A (en) Method for actively defending web attack and web security gateway based on active defense
Bugiel et al. TruWalletM: Secure web authentication on mobile platforms
Everything et al. Salt Lake City, Utah, June 1995.
Foo et al. Mobile agents for computer intrusion detection
Hindocha Threats to instant messaging
Snow et al. Simple authentication
Langer et al. Aspects of computer security: A primer
Liu et al. A trusted integrity measurement architecture for securing enterprise network
Endsuleit et al. A security analysis on jade (-s) v. 3.2
Baker et al. Assurance: the power behind PCASSO security.
Reid Plugging the holes in host-based authentication
Tian et al. Securing ARP from the ground up
Harrison et al. A protocol layer survey of network security
Cherckesova et al. The development of countermeasures against session hijacking