The Community for Technology Leaders
Computer Science and Information Engineering, World Congress on (2009)
Los Angeles, California USA
Mar. 31, 2009 to Apr. 2, 2009
ISBN: 978-0-7695-3507-4
pp: 66-70
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a task that can be delegated to a remote proxy server. This server has to engage the user in a challenge-response mechanism that does not require him to disclose his password to the local machine; if the user responds correctly, then the proxy must recover his password and fetch the protected resource for him. In this paper, we propose three schemes that are suitable for use in this environment and that do not require the proxy server to permanently store a copy of the user's password. We also briefly describe `Keep Your Password Secret' (KYPS), which is a system that implements one of the schemes, and that has been in use for almost two years.
one-time passwords, spyware, keyloggers, password, authentication

A. Pashalidis, "Accessing Password-Protected Resources without the Password," 2009 WRI World Congress on Computer Science and Information Engineering, CSIE(CSIE), Los Angeles, CA, 2009, pp. 66-70.
88 ms
(Ver 3.3 (11022016))