TITLE

Method of Authentication on Based Password Generators

AUTHOR(S)
Verlan, A. F.; Karimov, M. M.; Tashev, K. A.; Imamaliev, A. T.
PUB. DATE
December 2013
SOURCE
Proceedings of the International Conference on Application of In;2013, p773
SOURCE TYPE
Conference Proceeding
DOC. TYPE
Article
ABSTRACT
In this article the method of use of generators of pseudorandom numbers is offered at process of the authentication of the turned subject for protection of resources against unauthorized access in information and communication systems
ACCESSION #
99205353

 

Related Articles

  • Security of Graphical Passwords Using PCCP. Choudhary, Sarika; Singh, Ajit // International Journal of Computer Science Engineering & Technolo;May2014, Vol. 4 Issue 5, p143 

    We are well aware about problems persists in typically text-based passwords. Users generally choose memorable passwords, that are easy for attackers to guess, but the strong system generated passwords are difficult to remember. So a password authentication system should emphasis on maintaining...

  • QUANTITATIVE EVALUATION OF IDENTITY BASED CRYPTOGRAPHY IN AN AUTHENTICATION SCENARIO. PURA, Mihai-Lica // Proceedings of the Scientific Conference AFASES;May2013, p405 

    Identity based cryptography is a particular case of asymmetric cryptography in which the public key is chosen so that it uniquely identifies its owner. This information can be any identifier of a person or a system, like the e-mail address, the IP address, and so on. This way there is no need...

  • Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing. Singsit, Lamminthang; Stanislas Ashok, Marie // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p42 

    The main idea behind Cloud computing is to store data and other resources remotely in the cloud and accessed it anytime from anywhere through devices such as mobile devices, laptops and personal computers and any other thin client devices. This offers many advantages, like data ubiquity,...

  • Log your routine and ditch those inane passwords. Marks, Paul // New Scientist;1/4/2014, Vol. 221 Issue 2950, p20 

    The article discusses a method for logging into a computer that uses obscure facts about an individual's everyday life instead of a password, called narrative authentication, developed by Carson Brown and colleagues at Carleton University in Ottawa, Canada.

  • Password-reset information.  // Computer Act!ve;8/19/2015, Issue 456, p15 

    The article offers information on several websites, including one from Amazon Inc., Apple Inc., and Facebook, for users who wish to reset their passwords.

  • Let Me In! Belicove, Mikal E. // Entrepreneur;Aug2014, Vol. 42 Issue 8, p72 

    The article presents an answer to a question on the necessity of changing passwords every three months.

  • A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol. Pimentel, Juan C. López; Orozco, Rodolfo E. Ibarra; Fon Bon, Victor F. Ramos; Monroy, Raúl // Proceedings of the World Congress on Engineering & Computer Scie;Jul2013, Vol. 1, p1 

    Every day digital resources protection is an appealing research area because the amount of e-documents transmitted over non-secure channels such as the Internet has increased considerably. So, secure mechanisms must be implemented to identify illegal copies of crucial information. Many...

  • An Efficient Password-based Group Key Exchange Protocol Using Secret Sharing. Wei Yuan; Liang Hu; Hongtu Li; Jianfeng Chu // Applied Mathematics & Information Sciences;Jan2013, Vol. 7 Issue 1, p145 

    In this paper, a novel and efficent password based group key exchange protocol with secret sharing is proposed. Secret sharing technology is usually used to control the privileges of the authorized users to improve the robustness of the system in past years. The results are applied into...

  • Fortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters. Kaur, Kuljeet; Geetha, G. // International Journal of Computer Applications;Mar2012, Vol. 42, p36 

    Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics