Evolution of Authentication Mechanisms
نویسندگان
چکیده
This paper presents an evolution of authentication mechanisms from textual passwords to graphical authentication mechanisms. For security concerns password must be protected from the unauthorized users. Authentication and authorization is necessary for essential data, this requires authentication mechanisms. An important goal for authentication is user has easy to memorize their passwords and recall passwords either textual authentication or graphical authentication. Keywords— authentication; authorization; security; graphical passwords; textual passwords
منابع مشابه
Pareto Optimal Balancing of Four-bar Mechanisms Using Multi-Objective Differential Evolution Algorithm
Four-bar mechanisms are widely used in the industry especially in rotary engines. These mechanisms are usually applied for attaining a special motion duty like path generation; their high speeds in the industry cause an unbalancing problem. Hence, dynamic balancing is essential for their greater efficiency. In this research study, a multi-objective differential evolution algorithm is used for P...
متن کاملOpportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملAn RFID secure authentication mechanism in WLAN
With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کامل