[go: up one dir, main page]

Alghathbar et al., 2009 - Google Patents

Noisy password security technique

Alghathbar et al., 2009

View PDF
Document ID
3271251605115598829
Author
Alghathbar K
Mahmoud H
Publication year
Publication venue
2009 International Conference for Internet Technology and Secured Transactions,(ICITST)

External Links

Snippet

One-time password makes it more difficult to gain unauthorized access to restricted resources. In our previous work we designed a one-time password scheme that implements our noisy password scheme. The previous work proved to be a secure password entry …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
US9117065B2 (en) Dynamic interactive identity authentication method and system
US9684780B2 (en) Dynamic interactive identity authentication method and system
EP2649771A1 (en) A method for authentication and verification of user identity
Parmar et al. Generation of secure one-time password based on image authentication
CN1523809A (en) Password variable identification verification technique
Khan et al. Comparative study of authentication techniques
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Gulsezim et al. Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication
Alghathbar et al. Noisy password scheme: A new one time password system
Nandi et al. Graphical password authentication system
Boonkrong Security of passwords
JP3921942B2 (en) Authentication system
Hasan et al. Multifactor pattern implicit authentication
Alghathbar et al. Noisy password security technique
Shah et al. New factor of authentication: Something you process
Yoon et al. A secure chaotic hash-based biometric remote user authentication scheme using mobile devices
Aldoghje et al. Creating one time virtual encrypted identification number at the ATM
Yeole Proposal for novel 3D password for providing authentication in critical web applications
Sun et al. An interactive and secure user authentication scheme for mobile devices
Hemamalini et al. Graphical password authentication using hybrid pin keypad
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Naveen et al. Improved CAPTCHA based authentication for E-mail ID
Shakir et al. S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system
Miya et al. A two factor authentication system for touchscreen mobile devices using static keystroke dynamics and password
Madhusudhan et al. An enhanced biometrics-based remote user authentication scheme using mobile devices