• No results found

password-based user authentication

Survey on Graphical Password based User Authentication

Survey on Graphical Password based User Authentication

... user will first be asked to draw their signature with a mouse, and then the system will extract the signature area and either enlarge or scale-down the signature, and rotates if needed, (also known as ...

9

On  the  Security  of  `An  Efficient  Biometric  Authentication  Protocol  for  Wireless  Sensor  Networks'

On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'

... 7. A. K. Das, S. Chatterjee, and J. K. Sing. Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Net- works. In International ...

9

Password security and usability : from password checkers to a new framework for user authentication.

Password security and usability : from password checkers to a new framework for user authentication.

... Challenge-question based scheme: This system involves using a text password which is a set of pairs (question, answer) as proof of ...Several authentication techniques based on ...

156

Mobile Based User Authentication for Guaranteed Password Security Using key

Mobile Based User Authentication for Guaranteed Password Security Using key

... Abstract—Text password is the most popular form of user authentication on websites due to its convenience and ...one password, she will exploit it to gain access to more ...suffers ...

9

SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY

SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY

... authentication schemes have been proposed using smart cards because of the low cost. In 2011, Wang et al. [25] found that the Wang et al.'s scheme is vulnerable to the known-key attack and the smart card loss ...

6

3 Dimensional Sterling Conception for System Security

3 Dimensional Sterling Conception for System Security

... three authentication schemes like Persuasive Cued Click Points, grid based authentication scheme for secrete user name and color based authentication ...and user needs to ...

9

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method

... Graphical Password with Icons (GPI) [8] is developed to solve the hotspot ...a password in one group. With GPIS, the system creates a random password and shows it to ...the user is not happy ...

8

AUTHENTICATION USING PASSWORD-ONLY AND KEY EXCHANGE FOR MULTI SERVER ENVIRONMENT

AUTHENTICATION USING PASSWORD-ONLY AND KEY EXCHANGE FOR MULTI SERVER ENVIRONMENT

... two-server password based authentication schemes enables a user to use the same password over multiple service servers, which is deemed an important feature of the two-server ...

8

Unique Identification Number Based Online Census
System under e-Governance Initiatives

Unique Identification Number Based Online Census System under e-Governance Initiatives

... UID based online census system (UIDOCS) is ...relevant user interface, user authentication based on one time password and integration of census data with UIDAI database for ...

6

Review of Multimedia Graphical Grid Based Text Password Authentication for Advanced User

Review of Multimedia Graphical Grid Based Text Password Authentication for Advanced User

... A User Study Using Images for Authentication” presented the security of the systems relies on recognition-based, rather than recall-based ...recognition-based authentication ...

7

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

... infrastructure for smart card-based schemes, such as the cards and readers add substantially to the cost. In the real world, common storage devices, such as USB thumb drives, portable HDDs, mobile phones, and ...

7

Design and Implementation of a Nomadic Mobile App to Aid Multi-Level Authentication in a Ubiquitous Work Environment

Design and Implementation of a Nomadic Mobile App to Aid Multi-Level Authentication in a Ubiquitous Work Environment

... Electronic Authentication Guideline ([***13]), an evaluation of the proposed multi-level authentication mechanism to ascertain level of its implementation was ...simple password or ...network ...

6

Secure  modular  password  authentication  for  the  web  using  channel  bindings

Secure modular password authentication for the web using channel bindings

... human-friendly user authen- tication mechanism widely deployed on the ...user’s password is sent encrypted over an established server- authenticated Transport Layer Security (TLS, previously known as Secure ...

34

Oracle Endeca Platform Services. Security Guide Version March 2012

Oracle Endeca Platform Services. Security Guide Version March 2012

... store user names and passwords, but does not maintain information about a user’s ...The user group information is provided in a locally configurable password file (analogous to /etc/passwd on a UNIX ...

80

Title: Implementation of Invisible Watermarking and Random Codes for Authentication

Title: Implementation of Invisible Watermarking and Random Codes for Authentication

... graphical user authentication system that provides strong authentication to ...time user need to enter different set of characters for ...graphical authentication system is a good ...

6

IJCSMC, Vol. 2, Issue. 8, August 2013, pg.163 – 168 RESEARCH ARTICLE

IJCSMC, Vol. 2, Issue. 8, August 2013, pg.163 – 168 RESEARCH ARTICLE

... text password users resort to unsafe coping strategies, such as reusing pass-words across accounts to help with memorability, the decrease in security cannot be addressed by simply strengthening, in isolation, the ...

6

USER AUTHENTICATION BY SECURED GRAPHICAL PASSWORD IMPLEMENTATION

USER AUTHENTICATION BY SECURED GRAPHICAL PASSWORD IMPLEMENTATION

... paper, based on these recommendations, we design a simple graphical password scheme, called USER AUTHENTICATION BY SECURED GRAPHICAL PASSWORD ...IMPLEMENTATION. USER ...

8

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES

... During password creation, however, Passdoodles would likely require training of the recognition algorithm to build an accurate model of the ...comments based on our understanding of the ...Passdoodle ...

15

Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway

Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway

... traditional authentication with passwords and PIN has dominated the world ...reason, password and PIN authentication is nearing to the end of their life cycle in many applica- ...provide ...

23

Weakness of a Password Based Remote User Authentication Scheme

Weakness of a Password Based Remote User Authentication Scheme

... remote user password authentication is used to authenticate the legitimacy of the remote users over an insecure ...and user U and then from this intercepted information, he makes a valid login ...

6

Show all 10000 documents...

Related subjects