Search
Now showing items 1-10 of 83
Graph coloring for enforcing password identification against brute force attacks
(Scopus, 2008)
Password Identification or Weak Authentication is one of the weakest points in accessing a system and a suitable point for recurrent attacks of crackers or sniffers. Breakdowns ranging from dictionary brute force attacks ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
Cryptanalysis of an efficient three-party password-based key exchange scheme
(WILEY-BLACKWELLHOBOKEN, 2012)
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...