The Persistence of Passwords and Evaluating Authentication Alternatives

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=I7P-IF1pzh8



Duration: 1:14:56
67 views
0


An overwhelming number of authentication technologies have been proposed to replace passwords over the past 20 years. The published claims of superiority of each are refuted by the continued dominance of text passwords for user authentication on the web. What explains this disconnect between researchers and the real world? The answer is many-fold, and includes not only problem definition - but also evaluation criteria, which we assert the security research community lacks consensus on, and only a small subset of which are considered in most research papers. Our exploration considers numerous examples from a broad spectrum of authentication schemes, and suggests a framework and methodology for comparative evaluation.




Other Videos By Microsoft Research


2016-07-27Synthesis of small quantum and reversible circuits with quality guarantee
2016-07-27Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
2016-07-27Internet Voting: An Idea Whose Time Has Not Come
2016-07-27The Mechanical Cryptographer: Tolerant Algebraic Side-Channel Attacks using pseudo-Boolean Solvers
2016-07-27Practice-Driven Cryptographic Theory
2016-07-27Hawaii Intern XAPfest - Intro Session #1
2016-07-27Designing a Choice Architecture for Mobile Device Privacy and Security
2016-07-27Memory Abstractions for Parallel Programming
2016-07-27Making Genomic Data Analysis Faster and More Accurate
2016-07-27Logarithmic fluctuations from circularity
2016-07-27The Persistence of Passwords and Evaluating Authentication Alternatives
2016-07-27TouchDevelop - Create apps ON your phone!
2016-07-27Extensions of Bayesian Optimization for Real-World Applications
2016-07-27An overview of Multipath TCP and its applications
2016-07-27Scale-Independent Relational Query Processing with PIQL
2016-07-27Kitsune: Efficient, General-purpose Dynamic Software Updating for C
2016-07-27Differentially Private Learning on Large, Online and High-dimensional Data
2016-07-27A Brief Exposition Of Quadratic Forms In Two Variables Over The Integers
2016-07-27A Key Value Store that Supports Strict SLAs and the Applications that Need it
2016-07-27Erasure Codes for Big Data over Hadoop and Large-scale Sparse PCA for Twitter Analysis
2016-07-27The Convex Geometry of Inverse Problems



Tags:
microsoft research