Access to Network Login by Three-Factor Authentication for Effective Information Security
نویسندگان
چکیده
منابع مشابه
Access to Network Login by Three-Factor Authentication for Effective Information Security.
Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret ke...
متن کاملThe Distributed Authentication Login Scheme
In distributed system environment, security of system is an important issue whose basis is authentication protocol. Authentication protocol requires a authentication server which will decide login of users, and the server will be the main target of attacks. In this paper, we present a distributed authentication protocol model, whose goals are to avoid one point of attack and to increase availab...
متن کاملNetwork Access to Multimedia Information
This attribute contains a short description of the item. It may also include a Gopher reference to a longer abstract, held in a separate Gopher node. ASK This attribute is used for the interactive query extension. The interactive query facility in Gopher+ is used to obtain information from a user before retrieving the contents of a node. The client fetches the ASK attribute, which contains a li...
متن کاملdisclosure of classified information by wikileaks: a new conflict between the right of access to information and national security
disclosure of classified public interest information has become one of the major legal challenges in recent years. in the past decades the conflict between the right of people to receive information and principle of sovereignty within the framework of traditional media (direct broadcast satellite) resolved in favor of principle of free flow of information and the said conflict was replaced by ...
متن کاملPassword Authentication Scheme with Secured Login Interface
This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Scientific World Journal
سال: 2016
ISSN: 2356-6140,1537-744X
DOI: 10.1155/2016/6105053