password authentication
Recently Published Documents


TOTAL DOCUMENTS

579
(FIVE YEARS 94)

H-INDEX

34
(FIVE YEARS 2)

2022 ◽  
pp. 50-60
Author(s):  
D'Tron James ◽  
Md Abdullah Al Momin

Biometric sensors are becoming more commonplace in today's world. These biometric sensors are especially common in today's smartphones. Billions of smartphones use these sensors for security purposes, and these are slowly but surely replacing traditional forms of password authentication. Biometrics are commonly used to unlock devices and also for purchases. In this chapter, the focus will be on the most common types of biometrics featured in phones along with the sensors associated with them. Next, an analysis of the security risk of these sensors along with common attacks to exploit these risks are discussed. Lastly, various ways to patch and combat these various risks will be discussed.


Author(s):  
Touraj Khodadadi ◽  
Yashar Javadianasl ◽  
Faranak Rabiei ◽  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
...  

Author(s):  
Mustafa Shiwaish Hameed

A human footprint is a human biometric system. Each of them has specific footprints. It can be used instead of password authentication in security systems such as user authentication for financial transactions. The password-based system cannot verify that the person entering the password is valid. Therefore, a biometric system is more secure than a password-based system. In this seminar, a new identification system using CNN was presented. In addition, a new foot image data set was created by collecting foot images from 150 people. The presented proposed method presented 100% accuracy when compared with previous studies.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


Author(s):  
Mudarabilli Harshini ◽  
Padigala Lakshman Sai ◽  
Singam Chennamma ◽  
Thanuja ◽  
Alavalapati Goutham Reddy ◽  
...  

Author(s):  
Chandrashekhar Meshram ◽  
Sarita Gajbhiye Meshram ◽  
Rabha W. Ibrahim ◽  
Hamid A. Jalab ◽  
Sajjad Shaukat Jamal ◽  
...  

AbstractWith the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.


Sign in / Sign up

Export Citation Format

Share Document