Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

Password Security Books
Books related to password security.


Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys
One of the key problems of computer security is that of guaranteeing that an entity (person or system) really is who he, she, or it claims to be. Authentication procedures may be very trusting (as for "guest" accounts with limited capability), moderately strong (your bank requires both a physical card and a PIN before it will dispense money from an ATM), or nearly foolproof (biometric devices, which examine--to cite two examples--retina scans or fingerprints). Authentication: From Passwords to Public Keys examines the whole range of authentication options and offers advice on which one might be right for your security requirements, budget, and tolerance for user inconvenience. As the "public keys" part of the title implies, this book also deals with some aspects of encryption.

Rather than present a menagerie of security techniques and explain their strengths and weaknesses in an academic way, Richard Smith demonstrates the strength of protection mechanisms in the only way that counts--he shows how they can be defeated, and at what expenditure of effort. He's also made lists of attacks, complete with assessments of the popularity of each and the particular risk it poses, and a similar list of defenses. Margin notes refer to list entries by number, so it's easy to see what problems and solutions are covered in a given passage of text--though there's no index of references to attacks and defenses by number. --David Wall

Topics covered: How to defend computer systems, primarily through the application of identity-verification techniques. Those covered include passwords (including the randomly generated kind, and their hashes), authentication by machine address, biometric examination, smart cards, and RSA public-key cryptography.


The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography)

The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography)
No description


Perfect Passwords : Selection, Protection and Authentication

Perfect Passwords : Selection, Protection and Authentication
No description


Encyclopedia of Cryptography and Security

Encyclopedia of Cryptography and Security
No description


The Twofish Encryption Algorithm: A 128-Bit Block Cipher

The Twofish Encryption Algorithm: A 128-Bit Block Cipher
No description


Fast Software Encryption : 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings (Lecture Notes in Computer Science)

Fast Software Encryption : 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings (Lecture Notes in Computer Science)
No description


The Cryptogic Password Protocol

The Cryptogic Password Protocol
No description


Fast Software Encryption: 5th International Workshop, Fse '98 Paris, France, March 23-25, 1998 : Proceedings (Lecture Notes in Computer Science)

Fast Software Encryption: 5th International Workshop, Fse '98 Paris, France, March 23-25, 1998 : Proceedings (Lecture Notes in Computer Science)
No description


Theory of Cryptography : First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings (Lecture Notes in Computer Science)

Theory of Cryptography : First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings (Lecture Notes in Computer Science)
No description


Fast Software Encryption : 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers (Lecture Notes in Computer Science)

Fast Software Encryption : 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers (Lecture Notes in Computer Science)
No description



Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.