Makableh, 2016 - Google Patents
A New Approach To Detect Passwords File Theft And Intrusion AttemptsMakableh, 2016
View PDF- Document ID
- 10384916152814133299
- Author
- Makableh A
- Publication year
- Publication venue
- Zarqa University
External Links
Snippet
The successive developments in the world of computing and data sharing through Internet networks was accompanied by several methods that seek to save privacy and determine accessing privileges. Passwords have been an easy, common, practical and reliable …
- 238000005336 cracking 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan et al. | On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability | |
Bojinov et al. | Kamouflage: Loss-resistant password management | |
US6317834B1 (en) | Biometric authentication system with encrypted models | |
US9077710B1 (en) | Distributed storage of password data | |
US20090276839A1 (en) | Identity collection, verification and security access control system | |
Dionysiou et al. | Honeygen: Generating honeywords using representation learning | |
Jo et al. | Mindmetrics: Identifying users without their login IDs | |
Blocki et al. | Gotcha password hackers! | |
Binbeshr et al. | Secure PIN-entry method using one-time PIN (OTP) | |
Gao | Biometric authentication in smart grid | |
Adamu et al. | A three-step one-time password, textual and recall-based graphical password for an online authentication | |
Blocki | Usable human authentication: A quantitative treatment | |
Bicakci et al. | Analysis and evaluation of keystroke dynamics as a feature of contextual authentication | |
Nandi et al. | Graphical password authentication system | |
Boonkrong | Security of passwords | |
Yu et al. | Targeted honeyword generation with language models | |
van Oorschot | User authentication—passwords, biometrics and alternatives | |
Tellini et al. | Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform | |
Elftmann | Secure alternatives to password-based authentication mechanisms | |
Makableh | A New Approach To Detect Passwords File Theft And Intrusion Attempts | |
Sawant et al. | Honeywords: Making Password Cracking Detectable | |
Mahmoud | Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes | |
Varghese et al. | 3-Level Password Authentication System | |
Rundhaug | Keystroke dynamics-Can attackers learn someone’s typing characteristics | |
Jackson et al. | Biometric Authentication for the Mitigation of Human Risk on a Social Network |