Part of the Undergraduate Topics in Computer Science book series (UTICS)


Billy left home when he was in his teens and went to seek his fortune in Australia. When he returned home 30 years later as a mature, successful man, his relatives came to meet him at the dock in Southampton. He later remarked on this meeting to a friend “after not having seen my mother for 30 years, I have recognized her instantly among my many aunts, uncles, and other family.” This short (and usually true) story illustrates the use of identification and authentication in real life. We authenticate a person by looking at them and listening to them, and we can do this even after a long interval during which the person has greatly changed. A computer, unfortunately, cannot see its owner/user and has to rely on other means for authentication, which is the topic of this chapter.


Smart Card Telephone Number Social Engineering Data Encryption Standard Dictionary Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. attrition (2004) is
  2. gemalto (2010) is Scholar
  3. Grampp, F. T., and R. H. Morris (1984) “UNIX Operating System Security,” Bell Laboratories Technical Journal, 63(8)1649–1672, October.Google Scholar
  4. Mitnick, Kevin D. and William Simon (2002) The Art of Deception: Controlling the Human Element of Security, New York, John Wiley.Google Scholar
  5. openmarket (2010) is Scholar
  6. Orebaugh, Angela D. and Gilbert Ramirez (2004) Ethereal Packet Sniffing, Rockland, Mass., Syngress.Google Scholar
  7. packet-sniffing (2004) is
  8. sarnoff (2010) is
  9. spywareguide (2004) is
  10. Stoll, Clifford (1988) “Stalking the Wily Hacker,” Communications of the ACM, 31(5)484–497, May.CrossRefGoogle Scholar
  11. Stoll, Clifford (1990) The Cuckoo’s Egg, Bodley Head.Google Scholar
  12. Stoll, Clifford (2004)˜stoll/.

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations