User Authentication using Native Language Passwords

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Topics Covered User Authentication Passwords Tokens Biometrics Recommended Reading 2 User Authentication 2.1 Purposes

Computational Power. We have been assuming in our previous discussions that people can do complicated calculations. Encryption, hashing, ZK proofs, etc. all require a user to perform di cult computations. But people don't do computations, machines do. How do we, as people, identify ourselves to a machine? Access control. The process of of enforcing access rights for network resources. Access co...

متن کامل

Efficacy of Object-Based Passwords for User Authentication

Traditional text-based password schemes are inherently weak. Users tend to choose passwords that are easy to remember, making them susceptible to various attacks that have matured over the years. ObPwd [5] has tried to address these issues by converting user-selected digital objects to highentropy text passwords for user authentication. In this paper, we extend the ObPwd scheme with a new objec...

متن کامل

Authentication Using Graphical Passwords: Basic Results

Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password...

متن کامل

Passwords and Authentication

Computer security has been an issue since the first inception of the UNIX opearting system. Passwords were the first method of authentication, but are no longer the only method. Now there exist other methods including smartcards, voice, or biometrics, and they allow authentication against more than just the local computer or the local network and internet, such as databases and other applicatio...

متن کامل

Authentication Scheme for Session Passwords Using Color and Image

Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Security & Its Applications

سال: 2011

ISSN: 0975-2307

DOI: 10.5121/ijnsa.2011.3611