Secure Authentication Schemes

Abstract

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical passwords lack security due to hotspot coverage or attacker can record the password using camera. Token-based approach can be lost or stolen. Biometric systems cannot be changed. Later another security method emerges which combines the above methods into one scheme forming a 3-D password.3-D password is a multidimensional authentication scheme providing a virtual environment. It integrates muli-factor, multidimensional, multi-level security mechanisms. This paper presents a study on various authentication schemes based on security analysis.

Authors and Affiliations

Chintu Mathew, Arya Babu

Keywords

Related Articles

Effective Load Balancing Technique And Memory Management In Cloud

Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...

Reducing Latency Among Client-Server for Distributed Interactive Applications

The interactivity of DIAs is significant for members to have pleasant communication experiences. As a rule, interactivity is considered by the duration from the time when a participant issues an operation to the time...

Development of Antirigging Voting System Using Finger Print

Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present and use implementation is to implement the development of anti rigging voting system using finger print .The pu...

AR Simulated Camera

This paper provides an interactive idea for interior designing application using augmented reality (AR). Augmented reality merges real world and virtual world together. Due to the developing technology and lack of time,...

Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform

Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...

Download PDF file
  • EP ID EP27877
  • DOI -
  • Views 233
  • Downloads 0

How To Cite

Chintu Mathew, Arya Babu (2014). Secure Authentication Schemes. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27877