The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While numerous flaws have been recognized in using passwords as a method of authentication, passwords still remain the de-facto authentication standard in use today. Though password managers can ameliorate password fatigue, the vast majority of password managers require the user to choose and maintain a strong master password while offering little to no recourse in the event that the master password...
Smart card is widely accepted device which is used as a second authenticating factor in remote user authentication schemes. Kim-Chung proposed a remote user authentication scheme and they claimed that their scheme resists various security problems which were present in previous schemes such as offline leakage of password, stolen verifier attack, chances of masquerading the entities of the scheme....
Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
Despite being the most widely used method of authentication, passwords still pose a significant threat to an information system's security. This threat is mostly attributed to the human factor, as users tend to select passwords that are easy to remember, but are not resilient to brute force or dictionary attacks. Worse yet, when not prompted to change their passwords on a regular basis the users tend...
Users receive a multitude of digital-and physical-security advice every day. Indeed, if we implemented all the security advice we received, we would never leave our houses or use the Internet. Instead, users selectively choose some advice to accept and some (most) to reject, however, it is unclear whether they are effectively prioritizing what is most important or most useful. If we can understand...
The cloud services are shared in one are more customers by pooling in a multitenant environment, which provides virtualized resources to the customer using different technologies. Virtual machine (VM) is a important software program, which is being used in cloud computing. It includes the behavior of the computer and also which is act as an implementation carrier to accomplish the running applications...
Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The...
The earlier remote password authentication schemes required a service providing server to authenticate a legitimate user for remote login. However, the traditional schemes are not useful in multi-server architecture because of multiple user ids and passwords. In this paper, we present a remote password authentication scheme for multi-server architecture that can be robust and improved network security...
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access...
In this paper, we formulate the basic requirements for the novel security architecture and introduce provable experience authentication factor of the mobile device which is dual with respect to the “social network” authentication factor of the user. A method of multi-factor authentication of the device is proposed which allows effective blocking of clones in cellular networks and doesn't require any...
Analyzing the implementation of private cloud and Openstack authentication is necessary to work in an Openstack environment. Private cloud is implemented using Openstack and the aim is to provide a better performance in using Openstack and focus is on the underlying infrastructure on the performance of private cloud deployment.This Openstack is highly beneficial for the Research Centre Communities...
Now a day's fingerprint database can be stolen. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the fingerprints, system combines two distinct thumbprints into a new virtual Individuality...
The Student Information Report System (SIRS) has been developed for the purpose of sending regular reports to the student's parent about the activities of the student. SIRS consists of five modules which can be useful to work with the system in a simplified manner. Login module provides the authentication to the system and creation of new account for a staff. The access is available to the staff only...
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple tags and tag groups has become the research hotspot. However, there are many concerns about the security risks and privacy issues in lightweight RFID authentication scenarios. Many researches...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
Authentication refers to the process of ensuring confidentiality of data. It basically involves verifying a user's identity for accessing a system or service. There are three ways of authentication-i)using something that a user knows eg password ii)using something that a user has eg smart card or identity card iii)using something that a user is or does for example face, finger print, voice etc. To...
In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication...
One of the most accurate biometric authentication methods is iris pattern. It has the advantages of being stable, contactless and no user's previous knowledge is required. This paper presents an iris recognition system for user authentication. To design the proposed iris authentication system we reviewed and evaluated four iris pattern recognition features including Histogram of Oriented Gradients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.