From Passwords to Public keys Chapter 4 ~ Chapter 6 Authentication From Passwords to Public keys Chapter 4 ~ Chapter 6
Chapter 4 Design Patterns
Figure 4.1
Figure 4.2
Figure 4.3
Figure 4.4
Figure 4.5
Figure 4.6
Figure 4.7
Figure 4.8
Figure 4.9
Table 4.1: Properties of Authentication Patterns
Table 4.2: User Administration Responsiveness of Authentication Patterns
Table 4.3: Attack Summary
Table 4.4: Defense Summary
Chapter 5 Local Authentication
Figure 5.1
Figure 5.2
Figure 5.3
Figure 5.3
Figure 5.4
Table 5.1: Attack Summary
Table 5.2: Defense Summary
Picking PINs and Passwords Chapter 6 Picking PINs and Passwords
Figure 6.1
Table 6.1: Password Systems Are Not User Friendly
Finger 6.2
Table 6.2: Mouse Pad Searches and Average Attack Spaces
Figure 6.3
Figure 6.4
Figure 6.5
Table 6.3: Attack Summary
Table 6.4: Defense Summary