Skip to main content

2017 | OriginalPaper | Buchkapitel

3. Negative Authentication Systems

Who am I? “I am not this; no, nor am I this, nor this,” then which remains is the identity of I

verfasst von : Dipankar Dasgupta, Arunava Roy, Abhijit Nag

Erschienen in: Advances in User Authentication

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Password-based authentication systems are the oldest and most popular among all authentication methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Perlroth N (2013) Hackers in china attacked the times for last 4 months. NY Times, 30 Jan 2013 Perlroth N (2013) Hackers in china attacked the times for last 4 months. NY Times, 30 Jan 2013
4.
Zurück zum Zitat Brants T, Franz A (2006) The Google web 1t 5-gram corpus version 1.1. LDC2006T13 Brants T, Franz A (2006) The Google web 1t 5-gram corpus version 1.1. LDC2006T13
6.
Zurück zum Zitat Bonneau J (2012) Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge Bonneau J (2012) Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge
7.
Zurück zum Zitat Schechter S, Herley C, Mitzenmacher M (2010) Popularity is everything: a new approach to protecting passwords from statistical guessing attacks. In: Proceedings of the 5th USENIX conference on Hot topics in security, pp 1–8. USENIX Association Schechter S, Herley C, Mitzenmacher M (2010) Popularity is everything: a new approach to protecting passwords from statistical guessing attacks. In: Proceedings of the 5th USENIX conference on Hot topics in security, pp 1–8. USENIX Association
8.
Zurück zum Zitat Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: IEEE computer society symposium on research in security and privacy, pp 202–202. Institute of Electrical and Electronics Engineers Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: IEEE computer society symposium on research in security and privacy, pp 202–202. Institute of Electrical and Electronics Engineers
9.
Zurück zum Zitat De Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer De Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer
10.
Zurück zum Zitat Hofmeyr SA, Forrest S (2000) Architecture for an artificial immune system. Evol Comput 8(4):443–473 Hofmeyr SA, Forrest S (2000) Architecture for an artificial immune system. Evol Comput 8(4):443–473
11.
Zurück zum Zitat Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: The 2003 congress on evolutionary computation, 2003 (CEC’03), vol 1, pp 123–130 Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: The 2003 congress on evolutionary computation, 2003 (CEC’03), vol 1, pp 123–130
12.
Zurück zum Zitat Dasgupta D, Forrest S (1999) An anomaly detection algorithm inspired by the immune system. In: Artificial immune systems and their applications. Springer, pp 262–277 Dasgupta D, Forrest S (1999) An anomaly detection algorithm inspired by the immune system. In: Artificial immune systems and their applications. Springer, pp 262–277
13.
Zurück zum Zitat Esponda F, Ackley ES, Helman P, Jia H, Forrest S (2006) Protecting data privacy through hard-to-reverse negative databases. In: Information security, pp 72–84. Springer Esponda F, Ackley ES, Helman P, Jia H, Forrest S (2006) Protecting data privacy through hard-to-reverse negative databases. In: Information security, pp 72–84. Springer
14.
Zurück zum Zitat Dasgupta D, Azeem R (2008) An investigation of negative authentication systems. In: Proceedings of the 3rd international conference on information war-fare and security, pp 117–126 Dasgupta D, Azeem R (2008) An investigation of negative authentication systems. In: Proceedings of the 3rd international conference on information war-fare and security, pp 117–126
16.
Zurück zum Zitat Ji Z (2006) Negative selection algorithms: from the thymus to v-detector. Ph.D. thesis Ji Z (2006) Negative selection algorithms: from the thymus to v-detector. Ph.D. thesis
17.
Zurück zum Zitat Dasgupta D, Ferebee D, Saha S, Nag AK, Madero A, Sanchez A, William J, Subedi KP (2014) G-NAS: a grid-based approach for negative authentication. In: Symposium on computational intelligence in cyber security (CICS) at IEEE symposium series on computational intelligence (SSCI), IEEE, Orlando, Florida Dasgupta D, Ferebee D, Saha S, Nag AK, Madero A, Sanchez A, William J, Subedi KP (2014) G-NAS: a grid-based approach for negative authentication. In: Symposium on computational intelligence in cyber security (CICS) at IEEE symposium series on computational intelligence (SSCI), IEEE, Orlando, Florida
18.
Zurück zum Zitat Williams JR, Perkins E, Cook B (2004) A contact algorithm for partitioning N arbitrary sized objects. Eng Comput 21(2/3/4):235–248 Williams JR, Perkins E, Cook B (2004) A contact algorithm for partitioning N arbitrary sized objects. Eng Comput 21(2/3/4):235–248
19.
Zurück zum Zitat Dasgupta D, Saha S (2010) Password security through negative filtering. In: 2010 international conference on emerging security technologies (EST). IEEE, pp 83–89 Dasgupta D, Saha S (2010) Password security through negative filtering. In: 2010 international conference on emerging security technologies (EST). IEEE, pp 83–89
20.
Zurück zum Zitat Metropolis N, Ulam S (1949) The monte carlo method. J Am Stat Assoc 44(247):335–341 Metropolis N, Ulam S (1949) The monte carlo method. J Am Stat Assoc 44(247):335–341
21.
Zurück zum Zitat Kanerva P (1988) Sparse distributed memory. MIT press Kanerva P (1988) Sparse distributed memory. MIT press
25.
Zurück zum Zitat Dasgupta D, Saha S (2009) A biologically inspired password authentication system. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research. ACM, p 41 Dasgupta D, Saha S (2009) A biologically inspired password authentication system. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research. ACM, p 41
Metadaten
Titel
Negative Authentication Systems
verfasst von
Dipankar Dasgupta
Arunava Roy
Abhijit Nag
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-58808-7_3

Premium Partner