Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John G. Brainard is active.

Publication


Featured researches published by John G. Brainard.


computer and communications security | 2006

Fourth-factor authentication: somebody you know

John G. Brainard; Ari Juels; Ronald L. Rivest; Michael Szydlo; Moti Yung

User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token), something you are (e.g., a fingerprint), and something you know (e.g., a password). In this paper, we explore a fourth factor, the social network of the user, that is, somebody you know.Human authentication through mutual acquaintance is an age-old practice. In the arena of computer security, it plays roles in privilege delegation, peer-level certification, help-desk assistance, and reputation networks. As a direct means of logical authentication, though, the reliance of human being on another has little supporting scientific literature or practice.In this paper, we explore the notion of vouching, that is, peer-level, human-intermediated authentication for access control. We explore its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable. We describe a practical, prototype vouching system based on SecurID, a popular hardware authentication token. We address traditional, cryptographic security requirements, but also consider questions of social engineering and user behavior.


international conference on e business | 2009

Wireless Authentication and Transaction-Confirmation Token

Daniel V. Bailey; John G. Brainard; Sebastian Rohde; Christof Paar

Our new system combines Wi-Fi with user-authentication tokens to authenticate consumer financial transactions. To achieve this goal while maintaining maximum usability and compatibility, our token tunnels data through new side channels including the SSID field, packet timing, and packet length. These new point-to-point side-channels in Wi-Fi allow a token and PC to directly exchange messages – even while the PC is also connected to an access point. The result is a token that can authenticate transactions using only one touch by the user.


Lecture Notes in Computer Science | 1999

An X.509-Compatible Syntax for Compact Certificates

Magnus Nyström; John G. Brainard

Given an identified need for a compact format for digital certificates in constrained environments like embedded or high-volume systems, an X.509 [22] compatible proposal is described and compared with previous and related work.


network and distributed system security symposium | 1999

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.

Ari Juels; John G. Brainard


Archive | 2001

Method and apparatus for performing enhanced time-based authentication

John G. Brainard; Burton S. Kaliski; Ronald L. Rivest


Archive | 2005

System and method for authentication seed distribution

John G. Brainard; Burton S. Kaliski; Magnus Nyström; Ronald L. Rivest


workshop on privacy in the electronic society | 2004

Soft blocking: flexible blocker tags on the cheap

Ari Juels; John G. Brainard


Archive | 2004

Radio frequency identification system with privacy policy implementation based on device classification

Ari Juels; John G. Brainard


network and distributed system security symposium | 1999

Client Puzzles: A Cryptographic Defence against Connection Depletion Attacks

Ari Juels; John G. Brainard


Archive | 2000

Cryptographic countermeasures against connection depletion attacks

Ari Juels; John G. Brainard

Collaboration


Dive into the John G. Brainard's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniel V. Bailey

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marten van Dijk

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge