Boosting Authentication Security by Building Strong Password and Individualizing Easy to Remember Techniques
نویسندگان
چکیده
منابع مشابه
Guessing Attacks on Strong-Password Authentication Protocol
Password authentication is the most important and convenient protocol for verifying users to get the system’s resources. Lin et al. had proposed an optimal strongpassword authentication protocol (OSPA) which is a onetime password method. It can protect against the replaying attacks, impersonation attacks, and denial of service attacks. However, the authors shall show that the OSPA protocol is v...
متن کاملWeb Security Improving by using Dynamic Password Authentication
To detect a password while an internet user is logging in the website has been viewed as one of the significant problems. At the present time, although the HTTPS is broadly used, there are still some kinds of tools and equipments, e.g. Cain and BackTrack, which assist the hackers to detect and decode the HTTPS. At this point, this research aims to design a New Web Authentication in which it wil...
متن کاملOn the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
User authentication is an essential task for network security. To serve this purpose,in the past years, several strong password authentication schemes have been proposed, but none of them probably withstand to known security threats. In 2004, W. C. Ku proposed a new hash based strong password authentication scheme and claimed that the proposed scheme withstands to replay, password fie compromis...
متن کاملComments on the security of the SPAPA strong password authentication protocol
The hash function based Strong Password Authentication Protocol with User Anonymity (SPAPA) was designed to protect users against monitoring by utilising temporary identities instead of true identities. In this letter we show that it is vulnerable to several attacks, including two which allow an adversary to link the activities of a user.
متن کاملEnd User Authentication (EUA) Model and Password for Security
Authentication is one among a set of services that constitute a security subsystem in a modern computing or communications infrastructure. End User Authentication flexibility model proposed in this article will allow the user to have multiple authentications with varying levels of guarantee, and for suppliers to request and rely on mechanisms appropriate to the service requested. We describe th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of University of Human Development
سال: 2016
ISSN: 2411-7765,2411-7757
DOI: 10.21928/juhd.v2n3y2016.pp520-527