Abstract — User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of these problems are the prevalence of password sniffing and the difficulty of password management due to the increased number of accessible systems. In this paper, we propose a personal password management system called "One Touch Logon”, which replaces the annoying password-based authentication systems with a simple touch-and-login method. The effectiveness of the proposed system is demonstrated by implementing it on widely-used legacy systems such as Microsoft Windows and Web site logons. This mechanism is easy to implement and integrate with current...
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘lock...
Due to advancements and improvements in internet and communication systems, more people are relying ...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
the current practice of password based security for PLEs in general and the Internet in particular i...
It is recognised that, how things stand at present, distributed systems in general and the internet ...
The current practice of password based security for distributed systems in general and the Internet ...
The advent of computer technology has changed our lives. The Internet is a world in itself, with 1.8...
The widespread authentication mechanism of username and password is out-dated, and does not meet cur...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘lock...
Abstract—We evaluate two decades of proposals to replace text passwords for general-purpose user aut...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Part 2: Authentication and AuthorizationInternational audienceGraphical password based authenticatio...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘lock...
Due to advancements and improvements in internet and communication systems, more people are relying ...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
the current practice of password based security for PLEs in general and the Internet in particular i...
It is recognised that, how things stand at present, distributed systems in general and the internet ...
The current practice of password based security for distributed systems in general and the Internet ...
The advent of computer technology has changed our lives. The Internet is a world in itself, with 1.8...
The widespread authentication mechanism of username and password is out-dated, and does not meet cur...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘lock...
Abstract—We evaluate two decades of proposals to replace text passwords for general-purpose user aut...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Part 2: Authentication and AuthorizationInternational audienceGraphical password based authenticatio...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘lock...
Due to advancements and improvements in internet and communication systems, more people are relying ...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...