CS 513 - System Security
Lecture 15

Lecturer: Professor Fred B. Schneider
Notes by: Vicky Weissman
Lecture Date: 3/16/00


Today's Topic - Human Authentication

Approaches to Human Authentication

  • What you know (from last lecture)
  • What you are
  • What you have Note: The keyboard on the smart card and the cryptographic calculator can be used to do password-based authentication between the user and the device. This provides a second line of defense against attack.