A Comparison of Password Techniques for Multilevel Authentication Mechanisms

نویسندگان

  • Moshe Zviran
  • William J. Haga
چکیده

Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed in primary passwords are determined by the operating systems' manufacturers, system designers can select any password mechanism for secondary passwords, to further protect sensitive applications and data files. This paper reports on the results of an empirically based study of passwords characteristics. It provides a comparative evaluation on the memorability and users' subjective preferences of the various passwords mechanisms, and suggest that cognitive passwords and associative passwords seem the most appropriate for secondary passwords. CR

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multiple Click Based Graphical Authentication System

Authentication is possible in several ways namely textual, graphical, bio-metric, 3D password and third party authentication. In this paper, the authentication system is presented by introducing the multi-level authentication technique which generates the password in multiple levels to access the services. The details of proposed multilevel authentication techniques are presented along with dat...

متن کامل

Easing Text-based Mobile Device User Authentication Mechanisms

We discuss how a variety of techniques relevant to text entry or user identification could be used to facilitate reasonably fast and secure methods for authenticating mobile device users. In particular, we explore how mobile device text-entry methods could be used to speed up both the initial authentication of a mobile device user as well as subsequent password entry for authentication to other...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network

Password authentication using Hopfield Networks is presented in this paper .In this paper we discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. We observed how to get password authentication using Probabilistic values for Textual passwords and Graphical passwords. This study proposes the use of a Hopf...

متن کامل

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics

Mobile devices have become an important part of our everyday life, harvesting more and more confidential user information. Their portable nature and the great exposure to security attacks, however, call out for stronger authentication mechanisms than simple password-based identification. Biometric authentication techniques have shown potential in this context. Unfortunately, prior approaches ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Comput. J.

دوره 36  شماره 

صفحات  -

تاریخ انتشار 1993