6,268 Hits in 4.0 sec

Secure Banking Transaction using Encryption Based Negative Password Scheme

Abinaya R
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Then, the hashed password is randomly shuffled to get a negative password.  ...  Finally, the negative password is encrypted into an Encrypted Negative Password using a symmetric-key algorithm RC5, to further improve security.  ...  Propose the first one-time password authentication scheme based on the NDB.  ... 
doi:10.32628/cseit206475 fatcat:7m3x6ypncjgj7evcw7zidv7xgu

Web based security with LOPass user authentication protocol in mobile application

Ashish T. Bhole, Sheetal Chaudhari
2013 2013 IEEE International Conference on Computational Intelligence and Computing Research  
The proposed system is a user authentication protocol named LOPass which creates long term password and one time password for authenticating the user.  ...  The user needs remember only his long term password which has been stored in database very secretly and securely.  ...  Last but not the least, we would also like to thank to our friends for listening to our ideas, asking questions and providing feedback and suggestions for improving our ideas.  ... 
doi:10.1109/iccic.2013.6724167 fatcat:fkpdnug32rcgfb5z4khgcuwkba

Noisy password scheme: A new one time password system

Khaled Alghathbar, Hanan A. Mahmoud
2009 2009 Canadian Conference on Electrical and Computer Engineering  
Every time a user is authenticated by totally different password.  ...  The purpose of a one-time password (OTP) is to make it more difficult to gain unauthorized access to restricted resources, like a computer account.  ...  On these OTP systems, time is an important part of the password algorithm since the generation of new passwords is based on the current time rather than the previous password or a secret key.  ... 
doi:10.1109/ccece.2009.5090247 dblp:conf/ccece/AlghathbarM09 fatcat:dddhfun7obawboxm6ud5hh2ngu

A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords

P. S.V.Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani
2013 International Journal of Computer Applications  
Authentication is the process of identifying an individual, usually based on username and password. Authentication merely ensures that the individual is who he or she claims to be.  ...  This S3PA scheme provides the login screen to the user at every time the user logs in, this login image consists of set of characters.  ...  The authors wish to thank many anonymous referees for their suggestions to improve this paper.  ... 
doi:10.5120/12397-8776 fatcat:npxqhom6vvfednemlkxt42baoi

Password Authentication System using Coordinates & Location

Password authentication system is a very important factor for every system which needs to be secure. Every password is easy to crack and people are looking for a strong password to their systems.  ...  Here we use a password authentication system that is designed for high security and could be easily put into old system.  ...  We thank our colleagues who provided insight and expertise that greatly assisted the research, although they may not agree with all of the interpretations of this paper.  ... 
doi:10.35940/ijitee.a4384.119119 fatcat:srbzaxitkrgvri3c4lkx3nuxqe

Steganography-based Password Management: A conceptual Model

2019 Zanco Journal of Pure and Applied Sciences  
scheme for the user passwords and that exists outside of the user's domain.  ...  A B S T R A C T: The problem of password management is one of the oldest and most problematic issues in the context of computing security and personal digital information.  ...  However, our negative behaviour became one of the weaknesses of the password authentication scheme.  ... 
doi:10.21271/zjpas.31.s3.9 fatcat:2molyi4rzjenxkxmh4g6vd5zde

A New Graphical Password: Combination Of Recall & Recognition Based Approach

Md. Asraful Haque, Babbar Imam
2014 Zenodo  
The alphanumeric passwords are the most popular authentication method and still used up to now.  ...  In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. The system is a combination of recognition and pure recall based techniques.  ...  In step-2 authentication, each time the order of the questions will be random.  ... 
doi:10.5281/zenodo.1091323 fatcat:ctrsgewc4rcrdfke6trtgexa2y

Single password authentication

Tolga Acar, Mira Belenkiy, Alptekin Küpçü
2013 Computer Networks  
To the best of our knowledge, we are the first to propose such various and provably secure password-based authentication schemes.  ...  One way to overcome the inherent limitations of a two-party password-based authentication protocol is to add more parties to the protocol.  ...  One example of such an encryption scheme is the one-time pad, where Encrypt(esk , msg) = esk ⊕ msg.  ... 
doi:10.1016/j.comnet.2013.05.007 fatcat:qs724vx4bjhyxlsfi3dxawqkq4

Towards Usability Evaluation of Jumbled PassSteps

Jerome P, Technological Institute of the Philippines, Philippines
2019 International Journal of Advanced Trends in Computer Science and Engineering  
To overcome this problem, this study proposed a hotspot guessing attack resistant graphical password authentication scheme based on the modified PassMatrix method.  ...  Graphical password is the most popular mechanism and frequently assert the advantage that they are significantly more secure.  ...  ACKNOWLEDGEMENT We thank Technological Institute of the Philippines, Don Mariano Marcos Memorial State University, and Commission on Higher Education for their support towards the fulfillment of this scholarly  ... 
doi:10.30534/ijatcse/2019/08842019 fatcat:ppzvthcutjaqfjko4vk5rpilsu

SecAuthn: Provably Secure Multi-Factor Authentication for the Cloud Computing Systems

Sabout Nagaraju, Latha Parthiban
2016 Indian Journal of Science and Technology  
The proposed MFA approach integrates the bio-metric fingerprint with user-id, password and One-Time Password (OTP) and upgrades the existing Single Sign-On (SSO) and two-factor authentications to multi-factor  ...  Our investigation not only provides the robust remote authentication in cloud but also preserves the privacy of the authentication credentials.  ...  She has also published a book in the area of computer aided diagnosis.  ... 
doi:10.17485/ijst/2016/v9i9/81070 fatcat:6f2ogs5nwrbo5jkrhu3ap27ipy

Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication

Nafisah Kheshaifaty, Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia, Adnan Gutub, Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia
2021 Maǧallaẗ al-abḥāṯ al-handasiyyaẗ  
The CAPTCHA has several applications in the online security domain requiring to be merged with encrypted hash function benefitting from the facility of the graphical password schemes.  ...  We propose three layered security system that joins highly efficient security mechanisms to avoid users' stress of entering password many times or different other hectic routines in order to save account  ...  (Juang et al., 2008) Authentication by Encrypted Negative L-2016 587.9 ms 15.5% << SHA1 64 chars Password (Lv et al., 2016) hash MD5 Hash SMS One-time Password M-2003 881.7 ms 7.6% << SHA1 Table 4 .  ... 
doi:10.36909/jer.13761 fatcat:xhqxzuh225hkpoalcz2cqcydju

Secure Web Authentication Using OPASS to Prevent Secret Key Stealing

R. Nithyanandhan, Dr.G.Umarani Srikanth, Mr.S. Muthukumarasamy
2017 International Journal Of Engineering And Computer Science  
Text passwords have been adopted as the primary mean for user authentication in online websites. Humans are not experts in memorizing them, therefore they rely on the weak passwords.  ...  In case of users lose their cellphones, this still works by reissuing the SIM cards and long-term passwords. This is a efficient user authentication protocol and is at affordable cost.  ...  Assuming we wish to prepare one-time passwords, the first of these passwords is produced by performing hashes on input 1. The next one-time password is obtained by performing hashes 2.  ... 
doi:10.18535/ijecs/v6i6.28 fatcat:4nkqs7w3orakvgrjkzx7dj3fci

Your signature is your password: Haptic Passwords on Mobile Devices [article]

Junjie Yan, Tamara Bonaci, Howard Jay Chizeck
2020 arXiv   pre-print
The performance of the model is evaluated based on authentication accuracies.  ...  In this paper, a new behavioral biometric password based on haptic interaction is described. This "haptic password" system is built on a device that has a force-sensitive screen.  ...  First, during the enrollment phase for each user, the system must be trained based on the training set of the given user and generate a template database.  ... 
arXiv:2010.14007v1 fatcat:yzfipurx6rgkjmer3hmj2mrzqe

Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
2009 2009 First International Conference on Networked Digital Technologies  
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies  ...  ACM, 1998]. secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request  ...  We show a formal definition of a single-database PIR protocol based on the formulation in [5] . Let n be the number of data stored in the database. Let r , q , s , a be any non-negative integers.  ... 
doi:10.1109/ndt.2009.5272083 fatcat:dug6bqwowzh5jgz5cv3i4vxlqu

Literature Survey on Data Security using Carp Two Step Authentication based on Human and Hard AI Problems
IJARCCE - Computer and Communication Engineering

R.G. Vetrivel, J.Vasanth Kishore, B. Arun Kumar, S. Thivaharan
2015 IJARCCE  
The Current system is based on only text password but it has some disadvantages like small password mostly used and easy to remember.  ...  We are proposing a new system which uses multiple servers, enabling added level of security to the existing authentication, thereby providing access to the database.  ...  We also would like to thanks all the reference authors for the completion of this paper and we would like to thank our guide Mr.Thivaharan, Assistant Professor, Kalaignar Karunanidhi Institute of Technology  ... 
doi:10.17148/ijarcce.2015.4318 fatcat:ijwtx6syirh5der7r6kyql4wny
« Previous Showing results 1 — 15 out of 6,268 results