Browsing by Subject "Authentication"
Now showing items 1-1 of 1
-
Guessing human-chosen secrets
(University of CambridgeFaculty of Computer Science and TechnologyComputer Laboratory, 2012-06-12)Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of proposals for replacing or strengthening ...