Secure Authentication Schemes
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical passwords lack security due to hotspot coverage or attacker can record the password using camera. Token-based approach can be lost or stolen. Biometric systems cannot be changed. Later another security method emerges which combines the above methods into one scheme forming a 3-D password.3-D password is a multidimensional authentication scheme providing a virtual environment. It integrates muli-factor, multidimensional, multi-level security mechanisms. This paper presents a study on various authentication schemes based on security analysis.
Authors and Affiliations
Chintu Mathew, Arya Babu
A secure indexing method for privacy- preserving keyword search
E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once...
Perception Based On Its Incline And Pier Using Centroid Delineation Pitch Of Leaf
With the aim of elaborating a mobile application, accessible to anyone and with educational purposes, wepresent a method for tree species identification that relies on dedicated algorithms and explicit botanyinspired...
Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications
A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....
A Survey on Image Fusion Techniques
Image fusion is the process by which input images are fused in order to increase the quality. The input images must be the images of the same scene with different quality measures. The quality of the output image wil...
Procedure Dynamic Network and Prevent Mobile Typically Extension
Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and...