Fingerprint Protected Password Authentication Protocol
نویسندگان
چکیده
منابع مشابه
A protected password change protocol
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation attacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors ...
متن کاملDestructible Password Functionality Authentication Protocol
One of the biggest challenges that face the use of password as a security token is its low entropy. Researchers have proposed a cryptographic approach in an attempt to strengthen the security of password systems. In this paper, we investigate a new approach using irreducible polynomial in prime field GF (2) to build a secure password system that transforms the text of the password with every tr...
متن کاملZero Knowledge Password Authentication Protocol
In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...
متن کاملFortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters
Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...
متن کاملAn Anti-Phishing Password Authentication Protocol
Password authentication is commonly used to authenticate the user in web-based services such as internet banking due to its simplicity and convenience. Many users have multiple accounts and use the same password. The password is usually sent to the server over an HTTPS connection. However, this common practice makes the system vulnerable. An attacker can set up a phishing site masquerading as t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2019
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2019/1694702