Security user authentication procedures of web-applications
نویسندگان
چکیده
منابع مشابه
User PercePtion and Performance of aUthentication ProcedUres
There is no doubt that security mechanisms, such as authentication, are required in Information and Communication Technology, but they come at a price: Users need to spend additional time and effort to authenticate themselves. With this in mind, user perception of authentication is an important factor for successful use of authentication solutions. If users perceive an authentication procedure ...
متن کاملModified USB Security Token for User Authentication
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...
متن کاملA Security Protocol for Multi-User Authentication
Abstract: In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation [1]. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also inc...
متن کاملUser Authentication from Web Browsing Behavior
As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...
متن کاملAn User Authentication Infrastructure for Extranet Applications
An Extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security of the communications over Internet is considered an essential feature. To guarantee secure operation the aid of some user authentication infrastructure is needed. This paper introd...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Information Security Research Journal
سال: 2014
ISSN: 2410-7840,2221-5212
DOI: 10.18372/2410-7840.16.6936