[go: up one dir, main page]

Srividya et al., 2018 - Google Patents

Practical Authentication Mechanism using PassText and OTP.

Srividya et al., 2018

Document ID
2291492046372694238
Author
Srividya V
Swarnalatha P
Thirupathi L
Publication year
Publication venue
Grenze International Journal of Engineering & Technology (GIJET)

External Links

Snippet

Nowadays, especially with technology's fast development, password authentication mechanism is not enough anymore to provide complete security. This paper aims to implement a strong authentication mechanism with a practical reauthentication technique …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Huang et al. Using one-time passwords to prevent password phishing attacks
US8689001B1 (en) Method and system for protecting user identification information
Tirfe et al. A survey on trends of two-factor authentication
Pagar et al. Strengthening password security through honeyword and Honeyencryption technique
Choi et al. A secure OTP algorithm using a smartphone application
Srividya et al. Practical Authentication Mechanism using PassText and OTP.
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Al Abdulwahid et al. The current use of authentication technologies: an investigative review
Khairnar et al. Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment
Chakraborty et al. A Study on Password Protection and Encryption in the era of Cyber Attacks
CN101964792B (en) Multimode mapping based strong authentication method
Kushwaha An approach for user authentication one time password (numeric and graphical) scheme
Nandi et al. Graphical password authentication system
Balfanz et al. The future of authentication
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
Khande et al. An effective mechanism for securing and managing password using AES-256 encryption & PBKDF2
Walters et al. Assessing password threats: Implications for formulating university password policies
Gugała et al. Protecting web applications from authentication attacks
Persson et al. A Theoretical Proposal of Two-Factor Authentication in Smartphones
Waheed et al. Secure login protocols: An analysis on modern attacks and solutions
Mahbod et al. Cybersecurity Challenges and Application within the Army National Guard.
Patil et al. Effective authentication for restricing unauthorized user
Ibrahim et al. Client Authentication By Selected Secure Password-Based On Image Using Challenge Handshake Authentication Protocol.
Dinesha et al. Evaluation of secure cloud transmission protocol
ALRUWAILI et al. Improved multi-layer authentication scheme by merging one-time password with voice biometric factor