Access to Network Login by Three-Factor Authentication for Effective Information Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access to Network Login by Three-Factor Authentication for Effective Information Security.

Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret ke...

متن کامل

The Distributed Authentication Login Scheme

In distributed system environment, security of system is an important issue whose basis is authentication protocol. Authentication protocol requires a authentication server which will decide login of users, and the server will be the main target of attacks. In this paper, we present a distributed authentication protocol model, whose goals are to avoid one point of attack and to increase availab...

متن کامل

Network Access to Multimedia Information

This attribute contains a short description of the item. It may also include a Gopher reference to a longer abstract, held in a separate Gopher node. ASK This attribute is used for the interactive query extension. The interactive query facility in Gopher+ is used to obtain information from a user before retrieving the contents of a node. The client fetches the ASK attribute, which contains a li...

متن کامل

disclosure of classified information by wikileaks: a new conflict between the right of access to information and national security

disclosure of classified public interest information has become one of the major legal challenges in recent years. in the past decades the conflict between the right of people to receive information and principle of sovereignty within the framework of traditional media (direct broadcast satellite) resolved in favor of  principle of free flow of information and the said conflict was replaced by ...

متن کامل

Password Authentication Scheme with Secured Login Interface

This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Scientific World Journal

سال: 2016

ISSN: 2356-6140,1537-744X

DOI: 10.1155/2016/6105053