Authentication Mechanism Enhancement Utilising Secure Repository for Password Less Handshake

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure SAS-like password authentication schemes

Recently, there are several articles proposed for the so-called SAS password authentication scheme with lower storage, processing, and transmission overheads. For benefiting from these advantages, there are a series of researches on the SAS-like schemes. However, as knowledge of cryptanalysis has involved, a series of modification have been made. Unfortunately, those enhancements have still sec...

متن کامل

Graphical Password Using Captcha for More Secure Authentication Scheme

388 ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET  Abstract: A new security primitive for new graphical authentication scheme based on hard artificial intelligence problems. Number of graphical password scheme has been proposed as options to traditional to text password authentication, namely a new family of graphical password system for Captcha technology with the level of security. We...

متن کامل

Using the Secure Remote Password (SRP) Protocol for TLS Authentication

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This memo presents a technique for using the Secure Remote Password protocol as an authentication method for the Transport Layer Security protocol.

متن کامل

Security Enhancement for Two-Gene-Relation Password Authentication Protocol (2GR)

In 2004, Tsuji and Shimizu proposed a one-time password authentication protocol, named 2GR. By the 2GR protocol, an attacker who has stolen the verifiers from the server cannot impersonate a valid user. However, Lin and Hung described that it is vulnerable to an impersonation attack, in which any attacker can, without stealing the verifiers, masquerade as a legitimate user. In this paper, we sh...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRN Electronic Journal

سال: 2019

ISSN: 1556-5068

DOI: 10.2139/ssrn.3435979