Accessing Password-Protected Resources without the Password

  title={Accessing Password-Protected Resources without the Password},
  author={A. Pashalidis},
  journal={2009 WRI World Congress on Computer Science and Information Engineering},
  • A. Pashalidis
  • Published 2009
  • Computer Science
  • 2009 WRI World Congress on Computer Science and Information Engineering
  • Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a task that can be delegated to a remote proxy server. This server has to engage the user in a challenge-response mechanism that does not require him to disclose his password to the local machine; if the user responds correctly, then the proxy must recover his password and fetch the protected resource for him. In this… CONTINUE READING
    4 Citations

    Tables and Topics from this paper

    Pico: No More Passwords!
    • F. Stajano
    • Computer Science
    • Security Protocols Workshop
    • 2011
    • 76
    • PDF
    Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm
    • F. Cheng
    • Computer Science
    • Mob. Networks Appl.
    • 2011
    • 19
    Security Architecture for Things That Think
    • 8
    • PDF


    One-Time Password Access to Any Server without Changing the Server
    • 37
    • PDF
    KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
    • D. Florêncio, C. Herley
    • Computer Science
    • 2006 22nd Annual Computer Security Applications Conference (ACSAC'06)
    • 2006
    • 32
    • PDF
    Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
    • 135
    • PDF
    Impostor: a single sign-on system for use from untrusted devices
    • 27
    • PDF
    Selecting Secure Passwords
    • 23
    • PDF
    DOS-Resistant Authentication with Client Puzzles
    • 394
    • PDF
    A robust link-translating proxy server mirroring the whole web
    • 4
    • PDF
    Handbook of Applied Cryptography
    • 11,220
    • PDF
    Communication theory of secrecy systems
    • C. Shannon
    • Mathematics, Computer Science
    • Bell Syst. Tech. J.
    • 1949
    • 7,248
    • PDF
    The Base16, Base32, and Base64 Data Encodings
    • 409
    • PDF