Design a Novel User based Authentication System that Identify by User and Device

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Smart Card-based Authentication Scheme Using User Identify Cryptography

The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...

متن کامل

A bilateral remote user authentication scheme that preserves user anonymity

Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...

متن کامل

Awase-E: Photo-based User Authentication System

Hideki Koike†, Tetsuji Takada‡, Takehito Onuki† †Graduate School of Information Systems, University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan ‡Information Technology Research Institute, National Institute of Advanced Industrial Science and Technology 2-28-8 Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan Email: [email protected], [email protected], [email protected]...

متن کامل

Proposal: A Design of E-learning User Authentication System

The user authentication is very crucial in developing an e-learning system. Emerging standards for distance learning and education influence in a major way the development of e-learning systems. E-learning system must be secured against manipulation from the side of the students and also it protects user’s privacy. This paper examines privacy and security issues associated with e-learning. It p...

متن کامل

Easing Text-based Mobile Device User Authentication Mechanisms

We discuss how a variety of techniques relevant to text entry or user identification could be used to facilitate reasonably fast and secure methods for authenticating mobile device users. In particular, we explore how mobile device text-entry methods could be used to speed up both the initial authentication of a mobile device user as well as subsequent password entry for authentication to other...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2020

ISSN: 0975-8887

DOI: 10.5120/ijca2020920858