Authentication Using Session Based Passwords

被引:11
|
作者
Prabhu, Sanket [1 ]
Shah, Vaibhav [1 ]
机构
[1] Univ Texas Dallas, Dallas, TX 75080 USA
关键词
passwords; sessions; authentication; shoulder surfing;
D O I
10.1016/j.procs.2015.03.079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A very severe issue in today's computing world is the 'ACCESS' to an authenticated user. The most common and popular authentication mechanism is to use alphanumerical usemames and passwords including special characters and digits. But, textual passwords are most of the time prone to dictionary attacks, shoulder surfing, etc. Hence, graphical passwords have been introduced in this paper as an alternative to authentication schemes. Though the graphical password schemes help in generating more user friendly passwords, they are still vulnerable to shoulder surfing. To address this issue, text along with images can be combined to generate more secured passwords. Session passwords, as the name suggests can only be entered once and then, a new password is generated for the next session; thereby making the authentication process much stronger. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [41] Framework for VoIP authentication using session ID based on modified vector quantization
    1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (08):
  • [42] Matrix Passwords: A Proposed Methodology of Password Authentication
    Zhang, Xiao
    Clark, Jan
    AMCIS 2012 PROCEEDINGS, 2012,
  • [43] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [44] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [45] Comparing passwords, tokens, and biometrics for user authentication
    Esch, J
    PROCEEDINGS OF THE IEEE, 2003, 91 (12) : 2019 - 2020
  • [46] Usability of the login authentication process: passphrases and passwords
    Bhana, Bhaveer
    Flowerday, Stephen Vincent
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (02) : 280 - 305
  • [47] Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords
    Lis, Kamila
    Niewiadomska-Szynkiewicz, Ewa
    Dziewulska, Katarzyna
    SENSORS, 2023, 23 (15)
  • [48] PulseOblivion: An Effective Session-Based Continuous Authentication Scheme Using PPG Signals
    Aly, Hussein A.
    Di Pietro, Roberto
    IEEE ACCESS, 2023, 11 : 124213 - 124227
  • [49] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [50] Highly reliable two-factor biometric authentication based on handwritten and voice passwords using flexible neural networks
    Sulavko, A. E.
    COMPUTER OPTICS, 2020, 44 (01) : 82 - 91