Topics Covered User Authentication Passwords Tokens Biometrics Recommended Reading 2 User Authentication 2.1 Purposes
نویسنده
چکیده
Computational Power. We have been assuming in our previous discussions that people can do complicated calculations. Encryption, hashing, ZK proofs, etc. all require a user to perform di cult computations. But people don't do computations, machines do. How do we, as people, identify ourselves to a machine? Access control. The process of of enforcing access rights for network resources. Access control grants or denies permission to a given user for accessing a resource and protects resources by limiting access to only authenticated and authorized users. Computers may be required to control access to computer logins, buildings, or restricted databases. Authorization. The process of assigning access rights to a user. The access rights include speci cation, such as whether the user is permitted to read, write, or
منابع مشابه
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function and chaotic pseudo-random number generator to provide secure mutual authentication over an insecure channel between the user and remote server. Compared with the related biometric authentication schemes, the proposed s...
متن کاملIS Security: User Identification and Authentication - The First Pillar of IS Security
The Internet has brought many advantages to everyday and business life. Among the advantages is that an individual can now perform several financial transactions such as the transferring of funds and payments to creditors, from home or office (or even from overseas) 24 hours a day, seven days a week. However, the advantage of easy access also brings certain disadvantages. Recent television publ...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملHardware and user profiling for multi-factor authentication
Most software applications rely on the use of user-name and passwords to authenticate end users. This form of authentication, although used ubiquitously, is widely considered unreliable due to the users inability to keep them secret; passwords being prone to dictionary or rainbow-table attacks; as well as the ease with which social engineering techniques can obtain passwords. This can be mitiga...
متن کاملA Survey on Biometrics based Key Authentication using Neural Network
s The conventional method for user authentication is a password known to the user only. There is no security in the use of passwords if the password is known to an imposter and also it can be forgotten. So it is necessary to develop a better security system. Hence, to improve the user authentication passwords are replaced with biometric identification of the user. Thus usage of biometrics in au...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997