[go: up one dir, main page]

Boonkrong, 2020 - Google Patents

Password-based authentication

Boonkrong, 2020

Document ID
4542160722343217661
Author
Boonkrong S
Publication year
Publication venue
Authentication and Access Control: Practical Cryptography Methods and Tools

External Links

Snippet

Among today's factors and methods of authentication, the something-you-know factor, more specifically password, is the most commonly used. It remains the main method for proving user's identity for email accounts, Internet banking accounts, and other online services. This …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
US11468157B2 (en) Method for authenticating a user by user identifier and associated graphical password
US8918849B2 (en) Secure user credential control
US6901145B1 (en) Generation of repeatable cryptographic key based on varying parameters
CN106161006B (en) Digital encryption algorithm
US20090276839A1 (en) Identity collection, verification and security access control system
US8539574B2 (en) User authentication and access control system and method
CN109075972A (en) Password anti-theft authentication and encryption system and method
Dhanalakshmi et al. Password Manager with Multi-Factor Authentication
Baseer et al. Multi-factor authentication: A user experience study
Boonkrong Password-based authentication
Abbas et al. Pass point selection of automatic graphical password authentication technique based on histogram method
Joshi et al. Authentication using text and graphical password
KR101039909B1 (en) Hacking user authentication system and method
Mohamad et al. Image based authentication using zero-knowledge protocol
Matelski Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication
Gharbi et al. Honey Encryption Security Techniques: A Review Paper
Mihajlov et al. Recognition-based graphical authentication with single-object images
Varghese et al. 3-Level Password Authentication System
Chhetri Novel approach towards authentication using multi level password system
Naik et al. Advancements in User Security: Enhancing Usability with Graphical Password Authentication
EP2523140B1 (en) Secure user credential control
Chakraborty et al. On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries
Matelski Universal Key to Authentication Authority with Human-Computable OTP Generator
Chakravarthy et al. A Probabilistic Approach For Authenticating Text Or Graphical Passwords Using Back Propagation