User Authentication Using Grid Based Method
نویسندگان
چکیده
منابع مشابه
Biometric Based User Authentication Using Smart Card
Remote user authentication is one of the major issues in the rapid growing internet era. In this paper we propose a biometric based remote user authentication scheme using smart cards. The existing methods failed to be safe in remote user authentication as the secret values in either end of the communication could be guessed by the intruder. In our scheme we introduce an addition security at th...
متن کاملSensor-Based User Authentication
We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...
متن کاملThree-Factor User Authentication Method Using Biometrics Challenge Response
We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...
متن کامل"User Authentication Method and Implementation Using a Three-Axis Accelerometer"
The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis accelerometer. Unlike common user authentication methods which require memorizing complex phrases and are prone to physical attacks, our method requires a single training sample for a...
متن کاملCrypto System based Authentication using CSTA in Grid
Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and experiment data. When a user wants to request some computing and data resources, the grid can seamlessly, transparently and dynamically supply them. The security issue has become an important c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i2.14.11442