Negative Authentication Systems

Password-based authentication systems are the oldest and most popular among all authentication methods.

[1]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[2]  Joseph Bonneau,et al.  Guessing human-chosen secrets , 2012 .

[3]  Stuart E. Schechter,et al.  Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks , 2010, HotSec.

[4]  Dipankar Dasgupta,et al.  Password Security through Negative Filtering , 2010, 2010 International Conference on Emerging Security Technologies.

[5]  Paul Helman,et al.  Protecting data privacy through hard-to-reverse negative databases , 2006, International Journal of Information Security.

[6]  Dipankar Dasgupta,et al.  An Anomaly Entection Algorithm Inspired by the Immune Syste , 1999 .

[7]  Zhou Ji,et al.  Negative selection algorithms: from the thymus to v-detector , 2006 .

[8]  Pentti Kanerva,et al.  Sparse Distributed Memory , 1988 .

[9]  Zhou Ji,et al.  Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[10]  N. Metropolis,et al.  The Monte Carlo method. , 1949 .

[11]  Eric Perkins,et al.  A contact algorithm for partitioning N arbitrary sized objects , 2004 .

[12]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[13]  John R. Williams,et al.  G-NAS: A grid-based approach for negative authentication , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[14]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Dipankar Dasgupta,et al.  A biologically inspired password authentication system , 2009, CSIIRW '09.

[16]  Zhou Ji,et al.  V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..