John G. Brainard
EMC Corporation
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by John G. Brainard.
computer and communications security | 2006
John G. Brainard; Ari Juels; Ronald L. Rivest; Michael Szydlo; Moti Yung
User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token), something you are (e.g., a fingerprint), and something you know (e.g., a password). In this paper, we explore a fourth factor, the social network of the user, that is, somebody you know.Human authentication through mutual acquaintance is an age-old practice. In the arena of computer security, it plays roles in privilege delegation, peer-level certification, help-desk assistance, and reputation networks. As a direct means of logical authentication, though, the reliance of human being on another has little supporting scientific literature or practice.In this paper, we explore the notion of vouching, that is, peer-level, human-intermediated authentication for access control. We explore its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable. We describe a practical, prototype vouching system based on SecurID, a popular hardware authentication token. We address traditional, cryptographic security requirements, but also consider questions of social engineering and user behavior.
international conference on e business | 2009
Daniel V. Bailey; John G. Brainard; Sebastian Rohde; Christof Paar
Our new system combines Wi-Fi with user-authentication tokens to authenticate consumer financial transactions. To achieve this goal while maintaining maximum usability and compatibility, our token tunnels data through new side channels including the SSID field, packet timing, and packet length. These new point-to-point side-channels in Wi-Fi allow a token and PC to directly exchange messages – even while the PC is also connected to an access point. The result is a token that can authenticate transactions using only one touch by the user.
Lecture Notes in Computer Science | 1999
Magnus Nyström; John G. Brainard
Given an identified need for a compact format for digital certificates in constrained environments like embedded or high-volume systems, an X.509 [22] compatible proposal is described and compared with previous and related work.
network and distributed system security symposium | 1999
Ari Juels; John G. Brainard
Archive | 2001
John G. Brainard; Burton S. Kaliski; Ronald L. Rivest
Archive | 2005
John G. Brainard; Burton S. Kaliski; Magnus Nyström; Ronald L. Rivest
workshop on privacy in the electronic society | 2004
Ari Juels; John G. Brainard
Archive | 2004
Ari Juels; John G. Brainard
network and distributed system security symposium | 1999
Ari Juels; John G. Brainard
Archive | 2000
Ari Juels; John G. Brainard