Design a Novel User based Authentication System that Identify by User and Device
نویسندگان
چکیده
منابع مشابه
A Smart Card-based Authentication Scheme Using User Identify Cryptography
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...
متن کاملA bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...
متن کاملAwase-E: Photo-based User Authentication System
Hideki Koike†, Tetsuji Takada‡, Takehito Onuki† †Graduate School of Information Systems, University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan ‡Information Technology Research Institute, National Institute of Advanced Industrial Science and Technology 2-28-8 Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan Email: [email protected], [email protected], [email protected]...
متن کاملProposal: A Design of E-learning User Authentication System
The user authentication is very crucial in developing an e-learning system. Emerging standards for distance learning and education influence in a major way the development of e-learning systems. E-learning system must be secured against manipulation from the side of the students and also it protects user’s privacy. This paper examines privacy and security issues associated with e-learning. It p...
متن کاملEasing Text-based Mobile Device User Authentication Mechanisms
We discuss how a variety of techniques relevant to text entry or user identification could be used to facilitate reasonably fast and secure methods for authenticating mobile device users. In particular, we explore how mobile device text-entry methods could be used to speed up both the initial authentication of a mobile device user as well as subsequent password entry for authentication to other...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2020
ISSN: 0975-8887
DOI: 10.5120/ijca2020920858