Map
Index
Random
Help
th

Quote: an intruder can replace the login command and capture passwords; avoid by challenge-response or a handheld authenticator

topics > all references > references a-b > QuoteRef: bellSM10_1990 , p. 125



Topic:
password protection
Topic:
authentication

Quotation Skeleton

In a workstation environment, it is quite simple … employing them in the Kerberos dialog. Such an … network. … While this problem is not restricted to Kerberos … [with a challenge-response protocol]. … An alternative (first suggested to us by T.H. … [and transmit it to the user] … [p. 131] This allows the login procedure to prompt … of the password itself.   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: password protection (42 items)
Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.