Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

   

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

E-authentication: Using Cryptography, Biometrics and Knowledge Based Authentication and Tokens

Donna Dodson, National Institute of Standards and Technology (NIST)
April 21, 2008

Abstract

Donna DodsonThe ability to determine the identity of an individual allows information systems to support security functions including authentication, access control, and auditing. The rigor used to establish and confirm the identity of an individual provides the foundation an information system can have for assuring that an individual is who he claims to be. The quality of all decisions based on an established identity is limited by the credentials used in the identity's authentication. This talk will explore the technical foundations that are used to support e-authentication. It will address the strength of different technologies (including cryptography, biometrics and knowledge based authentication) that can be used as credentials in authentication schemes. The talk will conclude with considerations for building a general authentication framework.

Bio

Donna Dodson is the Deputy Cyber Security Advisor/Deputy Division Chief of the Computer Security Division at the National Institute of Standards and Technology. She is currently working in the areas of authentication and cryptography. She is a co-author of FIPS 201, Personal Verification of Federal Employees and Contractors and NIST SP 800-63, Electronic Authentication Guideline. Donna has also managed programs including the Advanced Encryption Standard, key management, PKI, and security testing.

Last Updated: 4/21/10