password based authentication
Recently Published Documents


TOTAL DOCUMENTS

101
(FIVE YEARS 24)

H-INDEX

13
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ping Liu ◽  
Syed Hamad Shirazi ◽  
Wei Liu ◽  
Yong Xie

For the simplicity and feasibility, password-based authentication and key agreement scheme has gradually become a popular way to protect network security. In order to achieve mutual authentication between users and edge cloud servers during data collection, password-based key agreement scheme has attracted much attention from researchers and users. However, security and simplicity are a contradiction, which is one of the biggest difficulties in designing a password-based key agreement scheme. Aimed to provide secure and efficient key agreement schemes for data collecting in edge cloud, we propose an efficient and secure key agreement in this paper. Our proposed scheme is proved by rigorous security proof, and the proposed scheme can be protected from various attacks. By comparing with other similar password-based key agreement schemes, our proposed scheme has lower computational and communication costs and has higher security.


2021 ◽  
Vol 15 (4) ◽  
pp. 98-117
Author(s):  
Priya C. V. ◽  
K. S. Angel Viji

In a password-based authentication technique, whenever the typed password and username matches the system database, the secure login page allows the client to access it. Despite the password matching, the proposed method checks the similarity between the typing rhythm of entered password and the rhythm of password samples in client's database. In this paper, a novel algorithmic procedure is presented to authenticate the legal client based on empirical threshold values obtained from the timing information of the client's keystroke dynamics. The exploratory outcomes demonstrate an impressive diminish in both false rejection rate and false acceptance rate. Equal error rate and authentication accuracy are also assessed to show the superiority and robustness of the method. Therefore, the proposed keystroke dynamics-based authentication method can be valuable in securing the system protection as a correlative or substitute form of client validation and as a useful resource for identifying the illegal invasion.


2021 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Rabha W. Ibrahim ◽  
Lunzhi Deng ◽  
Shailendra W. Shende ◽  
Sarita Gajbhiye Meshram ◽  
...  

Authentication is a very important aspect of computer security. Most systems employ strategies such as Password-based authentication, Multi-factor authentication, Certificate based authentication which are accompanied with a lot ofchallenges. To address this issue, most security systems have introduced the use of biometrics for authentication. Unimodal biometrics systems have many limitations regarding performance and accuracy. The use of Multimodal biometrics systems for authentication is recently attracting the attention of researchers due to its capacity to overcome most of the drawbacks of Unimodal biometric systems. This paper focuses on the use of biometric technology for authentication. The strengths of multimodal biometric systems, together with the challenges of multimodal biometric systems are presented. The paper also suggests solutions to the challenges of multimodal biometric systems.


Author(s):  
Guhdar Yousif Izadeen ◽  
Siddeeq Y. Ameen

In recent years, when users across the world have embraced smart devices in greater numbers owing to recent advances and appealing applications, they have also become a target for criminals who are zealously attempting to breach protection. As a result, a significant number of attacks have been observed on these systems. As a result, several password-based authentication mechanisms have been proposed to counteract these attacks. Among them, the graphical password scheme is more consistent with smart devices, which are highly graphic-oriented. However, current graphical password schemes are vulnerable to a variety of assaults, including shoulder surfing, smudging, intersection attacks, and reflection attacks. Thus, the paper aims to review recent published papers on android smart phone graphical password and identify used techniques. Moreover, the paper analyzes results to give better understanding for users of such devices to protect their devices from unauthorized access and attacks.


Author(s):  
Emerson Ribeiro de Mello ◽  
Michelle Silva Wangham ◽  
Samuel Bristot Loli ◽  
Carlos Eduardo da Silva ◽  
Gabriela Cavalcanti da Silva ◽  
...  

AbstractThe federated identity model provides a solution for user authentication across multiple administrative domains. The academic federations, such as the Brazilian federation, are examples of this model in practice. The majority of institutions that participate in academic federations employ password-based authentication for their users, with an attacker only needing to find out one password in order to personify the user in all federated service providers. Multi-factor authentication emerges as a solution to increase the robustness of the authentication process. This article aims to introduce a comprehensive and open source solution to offer multi-factor authentication for Shibboleth Identity Providers. Based on the Multi-factor Authentication Profile standard, our solution provides three extra second factors (One-Time Password, FIDO2 and Phone Prompt). The solution has been deployed in the Brazilian academic federation, where it was evaluated using functional and integration testing, as well as security and case study analysis.


Sign in / Sign up

Export Citation Format

Share Document