Filters








5,084 Hits in 5.8 sec

A Mobile Based Anti-Phishing Authentication Scheme Using Challenge-Response And Quick Response Code

Sharma Kishan S., S. Kurkure Shreyasi
2015 Zenodo  
People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication.  ...  Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature.  ...  Multiple authentication methods have been developed such smart card based system, one time password, SMS based OTP system and some using biometric features .Some of these authentication systems require  ... 
doi:10.5281/zenodo.1473249 fatcat:nh4pqbu26jaf5krd76qd4njkli

Multi-factor Authentication and their Approaches

Saroj Singh
2017 International Research Journal of Management IT and Social Sciences  
I thanks to Lord "Krishna" and "OMKAR" who blassed me to achieve my ambition by writing this research paper named "Multi-factor Authentication and their Approaches".  ...  MS Windows has smart card authentication functionality built in, allowing authentication against a password and a smart card with no additional software apart from the smart card device driver (if needed  ...  These "powered" smart cards typically consist of When the button is pressed, the card displays an OTP value, which is then typed by the user on his PC keyboard.  ... 
doi:10.21744/irjmis.v4i3.464 fatcat:x24q2cypy5gvxmsdsw667g6dca

Secure Remote User Authentication using Pass Script & Pass Text

2019 International journal of recent technology and engineering  
In general, Most of the secure systems were designed with text passwords along with additional factors such as tokens like smart card, mobile device.  ...  Authenticating users to secure systems is a crucial task for security experts to solve a password problem, where user should able to memorize a password or secret and password should be hard to guess and  ...  In this paper, we proposed a secure and user friendly authentication mechanism using mobile token for website users.  ... 
doi:10.35940/ijrte.d8376.118419 fatcat:vleoyyjp2zdillkubrcy6n5lpy

Anti Phishing for Mid-Range Mobile Phones

Imran Khan Memon, Muhammad Khalid Khan
2013 International Journal of Computer and Communication Engineering  
A mobile based anti phishing mechanism is proposed as shown in experiments, particularly for mid-range mobile phones that would protect users and their critical financial information from phishing attacks  ...  by generating three types of warnings such as vibration, flashing and text alert based warning, hence user would be restricted to visit any fake Webpage.  ...  Duplicate Image Finder techniques can be used for detection of phishing through similar logo and images on fake websites [5] .  ... 
doi:10.7763/ijcce.2013.v2.151 fatcat:kjqlyhfakbahtpi7ub6rz2xoza

Security Assessment of Cloud Based Computing(IACC'09.pdf [article]

MOHIT MATHUR
2021 figshare.com  
One of the mostly used methods today is the gaining of account access by stealing reusable credentials for Web sites that have not yet implemented "strong" user authentication.  ...  Authentication in an Cloud Environment guide identified that simple-password authentication is insufficient for ensuring authorized access to important cloud services.  ...  However A smart card-based system doesn't automatically allow user mobility. User mobility is only possible if every machine that the user access has a smart card reader attached.  ... 
doi:10.6084/m9.figshare.15073128.v1 fatcat:r2tcfa5dbvabroqi62mkv6kapm

A Survey And Comparison On User Authentication Methods

Prof. Shripad Kulkarni
2016 Zenodo  
In this paper we have first studied different types of accounts user can have based on their sensitivity,then we have studied what is authentication,threats to the authentication.  ...  So it has become crucial to have in depth knowledge of all authentication schemes so that user can choose best among them as per user�s requirement.  ...  Smart cards are used for identification and authentication.  ... 
doi:10.5281/zenodo.1463850 fatcat:67dpsrhc65eibbaev3wv6szkma

Web Authentication: no Password; Listen and Touch

Viorel LUPU
2019 Advances in Science, Technology and Engineering Systems  
To meet users' expectations, authentication systems must be safe, fast, efficient, intuitive and easy to use, especially on mobile phones.  ...  This paper presents some real-time multi-factor authentication methods that uses voice calls to communicate random passwords to registered users.  ...  The user acts (9) on displayed images based on his knowledge and according to the voice indications received through the smart headphones.  ... 
doi:10.25046/aj040109 fatcat:bb3gouu4avcfbevotmqqzsbqk4

AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME

Anupriyan K, Santhosh Kumar C, Nagaraj N
2017 International Journal on Smart Sensing and Intelligent Systems  
The authentication process can be secured by using double level security.  ...  Once the unique visual image is discovered to the user then that picture can be used as a password for detecting phishing. In the proposed system, privacy enabled secure database is built.  ...  sides of the system secure as well as an authenticated one.  ... 
doi:10.21307/ijssis-2017-236 fatcat:6eaplp2iwffhxh56aqzg7sluyy

Design, Analysis, and Implementation of a Twofactor Authentication Scheme using Graphical Password

Khaja Mizbahuddin Quadry, Research Scholar JNTUK, Andhra Pradesh, India, A Govardhan, Mohammed Misbahuddin
2021 International Journal of Computer Network and Information Security  
Since two-factor authentication ensures the required security strength, various organizations employ biometric-based or Smart Card or Cryptographic Token-based methods to ensure the safety of user accounts  ...  Therefore, this paper proposes the design of an authentication scheme for eservices which should be resistant to various attacks including a stolen verifier attack.  ...  The POC (after customizing it as per requirements) can be integrated well with any of the online financial services for secure authentication of a web user.  ... 
doi:10.5815/ijcnis.2021.03.04 fatcat:5varsi3y4vd6ng72rxtziage2m

E-learning Privacy and Security Requirements: Review

Hye-jin Kim
2013 Journal of Security Engineering  
Computers, tablets and mobile devices: Computers and tablets allow students and teachers' access to websites and other programs, such as Microsoft Word, PowerPoint, PDF files, and images.  ...  The security is very crucial in developing an e-learning system.  ...  Smart card: smart card use cryptographic mechanisms, namely public-key encryption, to provide authentication and identification.  ... 
doi:10.14257/jse.2013.10.5.07 fatcat:f6pxu4kbzzhd5lelhxr4n5lwfe

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

K.karthika .
2014 International Journal of Research in Engineering and Technology  
In addition to slicing the data, the encrypt data is hidden in to an image This process is done by using image as a secret key and original data will obtain by using same image as a secret key.  ...  The proposed scheme overcome these challenges by providing a user friendly environment and also enables the security policy by using secure single signon mechanism.  ...  This scheme is simple and efficient .Ku W.C and Chen S.M in [2] made improvements in providing efficient password based on user authentication scheme using smart cards.  ... 
doi:10.15623/ijret.2014.0319026 fatcat:rwws76dwkrc7lj5sims76sowfe

Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey

Asmaa M., Hala M., Mostafa-Sami M.
2018 International Journal of Computer Applications  
Here we present a comprehensive survey on the existing user's authentication techniques especially biometric-based techniques used for accessing cloud data.  ...  So, new biometric-based authentication techniques have been discovered to overcome the loop holes.  ...  token, a key, trusted device, passport, smart cards, or ID card as an Automatic Teller Machine card (ATM card) [21] [22] .  ... 
doi:10.5120/ijca2018916509 fatcat:qcf4qw4rujbcfcl5hl3h3aioey

A novel Two-Factor HoneyToken Authentication Mechanism [article]

Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris
2021 arXiv   pre-print
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted  ...  Both can be integrated into any platform or web application with the use of QR codes and a mobile phone.  ...  The principle of using passwords and smart cards to authenticate customers is an old idea going back 40 years now. Since then many systems with two-factor authentication mechanisms were developed.  ... 
arXiv:2012.08782v3 fatcat:3qq4mlc43vem7ijcv7pgoyd3me

Data-Minimizing Authentication Goes Mobile [chapter]

Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
2012 Lecture Notes in Computer Science  
Our measurements show that the use of smart phones for data-minimizing authentication can be an actual "game changer" for a broad deployment of anonymous credential systems.  ...  We describe two typical scenarios, design an architecture, and discuss a prototype implemented on a smart phone which minimizes the disclosure of personal data in a user-to-terminal authentication setting  ...  mechanisms, e.g., based on dynamic accumulators.  ... 
doi:10.1007/978-3-642-32805-3_5 fatcat:bq2ckt45hnagjjq734dhapd4q4

D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices

Abuarqoub
2019 Journal of Sensor and Actuator Networks  
Limited computing and energy resources on mobile devices makes authentication and encryption a challenging task. In this paper, an overview of MCC authentication protocols is presented.  ...  D-FAP aims at increasing authentication security by using multi-factors while offloading computation to the cloud to reduce battery consumption.  ...  Lost Smart Card Revocation Procedure An important feature of smart card-based authentication is revoking the lost smart cards without changing the user's identities.  ... 
doi:10.3390/jsan9010001 fatcat:p5irdyb43rds7nkfbhrgykym3e
« Previous Showing results 1 — 15 out of 5,084 results