usenix conference policies
Johnny Can Obfuscate: Beyond Mother’s Maiden Name
Abstract:
Challenge/response authentication is stronger than password authentication, but has traditionally required a device for computing the challenge. Though human computation is limited, people can compute simple responses to challenges. If the challenge and the corresponding response is obfuscated with decoy information, an authentication scheme might be strong enough for a number of applications. The signs used in major league baseball provide some interesting techniques for obfuscation.
BibTeX
@inproceedings {268926,
author = {William Cheswick},
title = {Johnny Can Obfuscate: Beyond {Mother{\textquoteright}s} Maiden Name },
booktitle = {First USENIX Workshop on Hot Topics in Security (HotSec 06)},
year = {2006},
address = {Vancouver, B.C. Canada},
url = {https://www.usenix.org/conference/hotsec-06/johnny-can-obfuscate-beyond-mother{\textquoteright}s-maiden-name},
publisher = {USENIX Association},
month = jul
}
author = {William Cheswick},
title = {Johnny Can Obfuscate: Beyond {Mother{\textquoteright}s} Maiden Name },
booktitle = {First USENIX Workshop on Hot Topics in Security (HotSec 06)},
year = {2006},
address = {Vancouver, B.C. Canada},
url = {https://www.usenix.org/conference/hotsec-06/johnny-can-obfuscate-beyond-mother{\textquoteright}s-maiden-name},
publisher = {USENIX Association},
month = jul
}
connect with us