Security user authentication procedures of web-applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User PercePtion and Performance of aUthentication ProcedUres

There is no doubt that security mechanisms, such as authentication, are required in Information and Communication Technology, but they come at a price: Users need to spend additional time and effort to authenticate themselves. With this in mind, user perception of authentication is an important factor for successful use of authentication solutions. If users perceive an authentication procedure ...

متن کامل

Modified USB Security Token for User Authentication

Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...

متن کامل

A Security Protocol for Multi-User Authentication

Abstract: In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation [1]. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also inc...

متن کامل

User Authentication from Web Browsing Behavior

As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...

متن کامل

An User Authentication Infrastructure for Extranet Applications

An Extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security of the communications over Internet is considered an essential feature. To guarantee secure operation the aid of some user authentication infrastructure is needed. This paper introd...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Information Security Research Journal

سال: 2014

ISSN: 2410-7840,2221-5212

DOI: 10.18372/2410-7840.16.6936