• No results found

Dynamic Password Authentication

Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm

Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm

... user’s password via the Internet. One-time password authentication methods use one- way functions extensively ...one-time password authentication methods and realizes mutual au- ...

10

An identity authentication and key agreement protocol based on industrial ethernet bus

An identity authentication and key agreement protocol based on industrial ethernet bus

... identity authentication and key agreement for data ...of dynamic password authentication, and use the key table for key ...mutual authentication and key agreement in a relatively short ...

6

Identity Authentication Research and Design in Single Sign on System

Identity Authentication Research and Design in Single Sign on System

... identity authentication problem between different ...static password login, Static password uses trival and security is not ...the dynamic password authentication in the unified ...

6

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

... graphical password scheme, an improvement on DAS (in term of grids) techniques was developed by Hai Tao in ...increase password space for DAS-type graphical password ...

8

A One-Time Server-Specific Password Authentication Scheme

A One-Time Server-Specific Password Authentication Scheme

... nent password-related attacks. A password file compromise on the server will only result in leaking the temporary User Verifiers, UV and the Password Verifier, PV, but not the Message ...

10

MULTIDIMENSIONAL PASSWORD AUTHENTICATION IN CLOUD COMPUTING

MULTIDIMENSIONAL PASSWORD AUTHENTICATION IN CLOUD COMPUTING

... dimensional password generation and authentication ...the password in a large no of dimensions of organization so that the secure transaction or any business related strategies are carried out with ...

7

3D PASSWORD AUTHENTICATION FOR WEB SECURITY

3D PASSWORD AUTHENTICATION FOR WEB SECURITY

... many authentication techniques available such as Textual Passwords, Graphical Passwords, Biometric Identification, ...existing authentication technique, a new improved authentication scheme is ...

5

Multi Tier Authentication with DIFFIE HELLMAN Key Exchange Using HMAC and AES Algorithm to Enhance Security in Cloud Computing

Multi Tier Authentication with DIFFIE HELLMAN Key Exchange Using HMAC and AES Algorithm to Enhance Security in Cloud Computing

... three-tier authentication which uses Diffie-Hellman Key Exchange algorithm for one time key generation, HMAC for data integrity and AES Encryption algorithm for ...the authentication tiers of the security ...

9

Design and Implementation of a Nomadic Mobile App to Aid Multi-Level Authentication in a Ubiquitous Work Environment

Design and Implementation of a Nomadic Mobile App to Aid Multi-Level Authentication in a Ubiquitous Work Environment

... Electronic Authentication Guideline ([***13]), an evaluation of the proposed multi-level authentication mechanism to ascertain level of its implementation was ...simple password or ...network ...

6

Towards An Efficient Graphical Password Authentication System: A Literature Survey

Towards An Efficient Graphical Password Authentication System: A Literature Survey

... The password problem arises largely from limitations of humans’ long-term memory ...a password has been chosen and learned the user must be able to recall it to log ...a password and prevent its ...

7

THREE LEVEL PASSWORD AUTHENTICATION SYSTEM

THREE LEVEL PASSWORD AUTHENTICATION SYSTEM

... These kind of passwords can be easily broken by brute force attacks. Eventhough when the user selects an alphanumeric password which is difficult to guess hacker can use shoulder surfing attack to get that ...

9

3D Graphical Password Authentication System

3D Graphical Password Authentication System

... recall-based authentication schemes used in the computer world is textual ...textual password is its two conflicting requirements: the selection of passwords that are easy to remember and, at the same time, ...

9

PASTA:  PASsword-based  Threshold  Authentication

PASTA: PASsword-based Threshold Authentication

... a password-based threshold authentication (PbTA) system, there are n servers and any number of ...generate authentication tokens, (ii) in the registration phase, a client C computes sign-up messages ...

45

User  Study  on  Single  Password  Authentication

User Study on Single Password Authentication

... a password satisfying the requirements ...a password after a number of ...the password was another struggle they ...stored password reminders (as hints helping him to recall the passwords) in ...

31

Session Key Based Password Authentication

Session Key Based Password Authentication

... smart-card-based password authentication in distributed ...Smart-card-based password authentication is one of the most commonly used security mechanisms to determine the identity of a remote ...

12

Survey Of Graphical Password Authentication Techniques

Survey Of Graphical Password Authentication Techniques

... Passwords are used from ancient times itself as the unique code to detect the malicious users. In modern times, passwords are used to limit access to protect computer operating systems, mobile phones, and others. A ...

8

Captcha as Graphical Password for E Commerce

Captcha as Graphical Password for E Commerce

... graphical password in a user authentication protocol, which we call captcha based password approval (CbPA) protocol, to reduce the online guessing ...of password attacks the user must resolve ...

8

A Novel Graphical Password Authentication Scheme

A Novel Graphical Password Authentication Scheme

... computer authentication method is to use alphanumerical usernames and ...a password is hard to guess, then it is often hard to ...graphical password systems built on top of Captcha technology, which ...

7

Session Password Authentication using Magic Rectangle Generation Algorithm(MRGA)

Session Password Authentication using Magic Rectangle Generation Algorithm(MRGA)

... graphical password authentication schemes are discussed in this paper which are vulnerable to security in some or the other ...of authentication to prevent against shoulder surfing threat and such ...

6

Secure  modular  password  authentication  for  the  web  using  channel  bindings

Secure modular password authentication for the web using channel bindings

... user’s password is sent encrypted over an established server- authenticated Transport Layer Security (TLS, previously known as Secure Sockets Layer (SSL)) channel in response to a received HTML ...access ...

34

Show all 10000 documents...

Related subjects