User Authentication using Native Language Passwords
نویسندگان
چکیده
منابع مشابه
Topics Covered User Authentication Passwords Tokens Biometrics Recommended Reading 2 User Authentication 2.1 Purposes
Computational Power. We have been assuming in our previous discussions that people can do complicated calculations. Encryption, hashing, ZK proofs, etc. all require a user to perform di cult computations. But people don't do computations, machines do. How do we, as people, identify ourselves to a machine? Access control. The process of of enforcing access rights for network resources. Access co...
متن کاملEfficacy of Object-Based Passwords for User Authentication
Traditional text-based password schemes are inherently weak. Users tend to choose passwords that are easy to remember, making them susceptible to various attacks that have matured over the years. ObPwd [5] has tried to address these issues by converting user-selected digital objects to highentropy text passwords for user authentication. In this paper, we extend the ObPwd scheme with a new objec...
متن کاملAuthentication Using Graphical Passwords: Basic Results
Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password...
متن کاملPasswords and Authentication
Computer security has been an issue since the first inception of the UNIX opearting system. Passwords were the first method of authentication, but are no longer the only method. Now there exist other methods including smartcards, voice, or biometrics, and they allow authentication against more than just the local computer or the local network and internet, such as databases and other applicatio...
متن کاملAuthentication Scheme for Session Passwords Using Color and Image
Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2011
ISSN: 0975-2307
DOI: 10.5121/ijnsa.2011.3611