Testing word associations, as an extension of simple password entry, may be a practical means of verifying the identity of individual computer users. If each user specifies his/her own cue-response associations, then responses will be easy to remember. It should be easy for legitimate users to respond correctly to word association testing, but virtually impossible for potential intruders. Such testing should also prove easy for a computer to process.
CooperJ. A. (1984). Computer-Security Technology.Lexington, MA: Lexington Books.
2.
CSC-STD-002–85. (1985, 12 April). Department of Defense Password Management Guideline.GeorgeFort G.Meade, MD: Department of Defense Computer Security Center.
3.
HaskettJ.A. (1984). Pass-algorithms: A user validation scheme based on knowledge of secret algorithms. Communications of the ACM, 27, 777–781.
4.
McFarlandC. E.Jr.FreyT. J.RhodesD. D. (1980). Retrieval of internally versus externally generated words in episodic memory. Journal of Verbal Learning and Verbal Behavior, 19, 210–225.
5.
PriceW.L. (1981). Encryption in computer networks and message systems. In UhligR.P. (Ed.) Computer Message Systems (pp. 413–423). New York: North-Holland.
6.
RogersT. B.KuiperN. A.KirkerW. C. (1977). Self-reference and the encoding of personal information. Journal of Personality and Social Psychology, 35, 677–688.
7.
SlameckaN. J.GrafP. (1978). The generation effect: Delineation of a phenomenon. Journal of Experimental Psychology: Human Learning and Memory, 4, 592–604.