[go: up one dir, main page]

Makableh, 2016 - Google Patents

A New Approach To Detect Passwords File Theft And Intrusion Attempts

Makableh, 2016

View PDF
Document ID
10384916152814133299
Author
Makableh A
Publication year
Publication venue
Zarqa University

External Links

Snippet

The successive developments in the world of computing and data sharing through Internet networks was accompanied by several methods that seek to save privacy and determine accessing privileges. Passwords have been an easy, common, practical and reliable …
Continue reading at www.zu.edu.jo (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Yan et al. On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
Bojinov et al. Kamouflage: Loss-resistant password management
US6317834B1 (en) Biometric authentication system with encrypted models
US9077710B1 (en) Distributed storage of password data
US20090276839A1 (en) Identity collection, verification and security access control system
Dionysiou et al. Honeygen: Generating honeywords using representation learning
Jo et al. Mindmetrics: Identifying users without their login IDs
Blocki et al. Gotcha password hackers!
Binbeshr et al. Secure PIN-entry method using one-time PIN (OTP)
Gao Biometric authentication in smart grid
Adamu et al. A three-step one-time password, textual and recall-based graphical password for an online authentication
Blocki Usable human authentication: A quantitative treatment
Bicakci et al. Analysis and evaluation of keystroke dynamics as a feature of contextual authentication
Nandi et al. Graphical password authentication system
Boonkrong Security of passwords
Yu et al. Targeted honeyword generation with language models
van Oorschot User authentication—passwords, biometrics and alternatives
Tellini et al. Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform
Elftmann Secure alternatives to password-based authentication mechanisms
Makableh A New Approach To Detect Passwords File Theft And Intrusion Attempts
Sawant et al. Honeywords: Making Password Cracking Detectable
Mahmoud Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes
Varghese et al. 3-Level Password Authentication System
Rundhaug Keystroke dynamics-Can attackers learn someone’s typing characteristics
Jackson et al. Biometric Authentication for the Mitigation of Human Risk on a Social Network