Kerberos for Email Login

نویسنده

  • Rashmi Hegde
چکیده

Advances in the field of Information Technology make Information Security an inseparable part of it. In today's world, Electronic mail or e-mail is the one that is most prone to intrusions like phishing which acquires sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. In order to deal with security, authentication like biometrics plays an important role. Biometrics technology is simply the measurement and use of the unique characteristics of living humans to distinguish them from one another to ensure that the rendered services are accessed only by a legitimate user and it is more useful as compared to passwords as they can be lost or stolen. In this paper, a method which is based on biometric recognition which would avoid any intrusion possible to the email is proposed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Joining Security Realms: A Single Login for NetWare and Kerberos

Accommodating disjoint security realms is a challenge for administrators who have to maintain duplicate data sets and for users who need to recall multiple pass phrases, yet joining security realms together can expose one realm to the weaknesses of the other. In this paper, we compare the Kerberos and NetWare security realms, examine methods of joining the two realms under a single login, and p...

متن کامل

Heimdal—an independent implementation of Kerberos 5

Heimdal is an independently developed and free implementation of the Kerberos 5 protocol, unencumbered by US export restrictions. It is compatible with other implementations and is close to the MIT Kerberos 5 API. It includes versions of common applications such as telnet, ftp, rsh, su, and login. Furthermore, it has some new features not available in other implementations, such as authenticate...

متن کامل

IMPROVING THE SECURITY PERFORMANCE IN COMPUTER GRIDS Architecture and Results

Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture we use a Kerberos-based approach (symmetric cryp...

متن کامل

Refining Computationally Sound Mechanized Proofs for Kerberos

Kerberos is designed to allow a user to repeatedly authenticate herself to multiple servers based on a single login. The PKINIT extension to Kerberos modifies the initial round of the protocol to use a PKI instead of long-term shared keys (e.g., password-derived keys). Especially with PKINIT, Kerberos uses a rich collection of cryptographic operations and constructs, and Kerberos, both with and...

متن کامل

A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment

Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a multi-server password authentication protocol which highlights no verification table in the server end could therefore be an alternative. Typically, there are three roles in a multi-server password authentication protocol: clients, servers, and a register center which plays the role like KDC in Kerb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014