Alghathbar et al., 2009 - Google Patents
Noisy password security techniqueAlghathbar et al., 2009
View PDF- Document ID
- 3271251605115598829
- Author
- Alghathbar K
- Mahmoud H
- Publication year
- Publication venue
- 2009 International Conference for Internet Technology and Secured Transactions,(ICITST)
External Links
Snippet
One-time password makes it more difficult to gain unauthorized access to restricted resources. In our previous work we designed a one-time password scheme that implements our noisy password scheme. The previous work proved to be a secure password entry …
- 238000000034 method 0 title abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9117065B2 (en) | Dynamic interactive identity authentication method and system | |
US9684780B2 (en) | Dynamic interactive identity authentication method and system | |
EP2649771A1 (en) | A method for authentication and verification of user identity | |
Parmar et al. | Generation of secure one-time password based on image authentication | |
CN1523809A (en) | Password variable identification verification technique | |
Khan et al. | Comparative study of authentication techniques | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Gulsezim et al. | Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Nandi et al. | Graphical password authentication system | |
Boonkrong | Security of passwords | |
JP3921942B2 (en) | Authentication system | |
Hasan et al. | Multifactor pattern implicit authentication | |
Alghathbar et al. | Noisy password security technique | |
Shah et al. | New factor of authentication: Something you process | |
Yoon et al. | A secure chaotic hash-based biometric remote user authentication scheme using mobile devices | |
Aldoghje et al. | Creating one time virtual encrypted identification number at the ATM | |
Yeole | Proposal for novel 3D password for providing authentication in critical web applications | |
Sun et al. | An interactive and secure user authentication scheme for mobile devices | |
Hemamalini et al. | Graphical password authentication using hybrid pin keypad | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Naveen et al. | Improved CAPTCHA based authentication for E-mail ID | |
Shakir et al. | S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system | |
Miya et al. | A two factor authentication system for touchscreen mobile devices using static keystroke dynamics and password | |
Madhusudhan et al. | An enhanced biometrics-based remote user authentication scheme using mobile devices |