Secure Authentication Schemes

Abstract

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical passwords lack security due to hotspot coverage or attacker can record the password using camera. Token-based approach can be lost or stolen. Biometric systems cannot be changed. Later another security method emerges which combines the above methods into one scheme forming a 3-D password.3-D password is a multidimensional authentication scheme providing a virtual environment. It integrates muli-factor, multidimensional, multi-level security mechanisms. This paper presents a study on various authentication schemes based on security analysis.

Authors and Affiliations

Chintu Mathew, Arya Babu

Keywords

Related Articles

A secure indexing method for privacy- preserving keyword search

E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once...

Perception Based On Its Incline And Pier Using Centroid Delineation Pitch Of Leaf

With the aim of elaborating a mobile application, accessible to anyone and with educational purposes, wepresent a method for tree species identification that relies on dedicated algorithms and explicit botanyinspired...

Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications

A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....

A Survey on Image Fusion Techniques

Image fusion is the process by which input images are fused in order to increase the quality. The input images must be the images of the same scene with different quality measures. The quality of the output image wil...

Procedure Dynamic Network and Prevent Mobile Typically Extension

Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and...

Download PDF file
  • EP ID EP27877
  • DOI -
  • Views 237
  • Downloads 0

How To Cite

Chintu Mathew, Arya Babu (2014). Secure Authentication Schemes. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27877