Authentication Using Session Based Passwords

被引:11
|
作者
Prabhu, Sanket [1 ]
Shah, Vaibhav [1 ]
机构
[1] Univ Texas Dallas, Dallas, TX 75080 USA
关键词
passwords; sessions; authentication; shoulder surfing;
D O I
10.1016/j.procs.2015.03.079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A very severe issue in today's computing world is the 'ACCESS' to an authenticated user. The most common and popular authentication mechanism is to use alphanumerical usemames and passwords including special characters and digits. But, textual passwords are most of the time prone to dictionary attacks, shoulder surfing, etc. Hence, graphical passwords have been introduced in this paper as an alternative to authentication schemes. Though the graphical password schemes help in generating more user friendly passwords, they are still vulnerable to shoulder surfing. To address this issue, text along with images can be combined to generate more secured passwords. Session passwords, as the name suggests can only be entered once and then, a new password is generated for the next session; thereby making the authentication process much stronger. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [1] Authentication Schemes for Session Passwords using Colors
    Dorage, Nita
    Sawant, Bhakti
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 120 - 123
  • [2] Mutual zero-knowledge Authentication based on Virtual Passwords per Session (MAVPS)
    Asimi, Younes
    Amghar, Abdellah
    Asimi, Ahmed
    Sadqi, Yassine
    2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, : 231 - 236
  • [3] Wireless Authentication using Remote Passwords
    Harding, Andrew
    van der Horst, Timothy W.
    Seamons, Kent E.
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 24 - 29
  • [4] Using Template-Based passwords for authentication in E-banking
    Kalayeh, Mahdi Rahimi Ghazi
    Nik, Mohammadreza Harati
    Kordestani, Hossain
    2013 7TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-SECURITY (ECDC), 2013,
  • [5] Encoding Passwords using QR Image for Authentication
    Istyaq, Salim
    Umar, Mohammad Sarosh
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 818 - 823
  • [6] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +
  • [7] Two Factor Authentication using EEG Augmented Passwords
    Svogor, Ivan
    Kisasondi, Tonimir
    PROCEEDINGS OF THE ITI 2012 34TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES (ITI), 2012, : 373 - 378
  • [8] Improvement of remote user authentication schemes using passwords
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100191, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2008, 9 (1037-1040):
  • [9] Authentication Protocols Based on One-Time Passwords
    Babkin, Sergey
    Epishkina, Anna
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1794 - 1798
  • [10] PASSWORDS PHILOLOGY, SECURITY, AUTHENTICATION
    Lennon, Brian
    DIACRITICS-A REVIEW OF CONTEMPORARY CRITICISM, 2015, 43 (01): : 82 - 107