Password Authentication Based on Fractal Coding Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Password Authentication Based on Fractal Coding Scheme

Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password s...

متن کامل

Weaknesses of Password Authentication Scheme Based on Geometric Hashing

We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.

متن کامل

A Simple Password Authentication Scheme Based on Geometric Hashing Function

Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...

متن کامل

A Hybrid Password Authentication Scheme Based on Shape and Text

Textual-based password authentication scheme tends to be more vulnerable to attacks such as shouldersurfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Because simply adopting graphical password authentication also has some drawbacks, schemes ...

متن کامل

Cryptanalysis of a smart card based secure password authentication scheme

Recently, Wang and Chang proposed a password authentication scheme is embedded in a smart card. This new verifier authenticates the login password key in without password table adoption. The safety aspects for this protocol were constructed on the basis of intensity factors and discrete logarithm. Nonetheless, in the year of 2008, Yoon et al. pointed out that there was a security loophole withi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Applied Mathematics

سال: 2012

ISSN: 1110-757X,1687-0042

DOI: 10.1155/2012/340861