Fingerprint Protected Password Authentication Protocol

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A protected password change protocol

Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation attacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors ...

متن کامل

Destructible Password Functionality Authentication Protocol

One of the biggest challenges that face the use of password as a security token is its low entropy. Researchers have proposed a cryptographic approach in an attempt to strengthen the security of password systems. In this paper, we investigate a new approach using irreducible polynomial in prime field GF (2) to build a secure password system that transforms the text of the password with every tr...

متن کامل

Zero Knowledge Password Authentication Protocol

In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...

متن کامل

Fortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters

Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...

متن کامل

An Anti-Phishing Password Authentication Protocol

Password authentication is commonly used to authenticate the user in web-based services such as internet banking due to its simplicity and convenience. Many users have multiple accounts and use the same password. The password is usually sent to the server over an HTTPS connection. However, this common practice makes the system vulnerable. An attacker can set up a phishing site masquerading as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2019

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2019/1694702