Securing remote access to information systems of critical infrastructure using two-factor authentication

R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
Information systems of critical infrastructure provide services on which the core functions of a
state and its economy depend as well as welfare of society. Such systems are becoming an …

Authentication using emoji-based passwords

M Mossoba, AMH Benkreira, J Edwards - US Patent 10,169,566, 2019 - Google Patents
An application platform may receive an input from a user associated with a user account.
The input may relate to a request for access to the user account, and include a selec tion of …

Password security system with 2-way authentication

S Biswas, S Biswas - 2017 Third International Conference on …, 2017 - ieeexplore.ieee.org
This paper proposes a password security system that allows the host not to store the
passwords of its users at its end. Instead it creates and stores a derivative of the password …

PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS

W Safder - 2024 - diva-portal.org
An era in which transactions and communication are quick and easy owing to fast-growing
IT technology has commenced nowadays. Because of the extensive use of IT and its wide …

Authentication Using Text and Graphical Password

AM Joshi, B Muniyal - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Graphical password tends to be very promising and trending alternative technique to
traditional methods like simple text password and alphanumeric passwords. It is the ease of …

[PDF][PDF] Shouldersurfing resistant graphical password system for cloud

V Rodda, GR Kancherla, BR Bobba - International Journal of Applied …, 2017 - academia.edu
Cloud based applications authenticate users before they are allowed to access the services
provided by them. Most commonly used user authentication mechanism is text-based …

Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication

M Obaidat, J Brown - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Current paradigms for client-server authentication often rely on username/password
schemes. Studies show such schemes are increasingly vulnerable to heuristic and brute …

Simple and secured password hiding technique for image-based authentication using a least significant bit based embedding scheme

FB Calanda, AM Sison, MRD Molato… - 2019 IEEE 4th …, 2019 - ieeexplore.ieee.org
This study proposes a secured and straightforward password hiding technique to address
authentication problems. The idea of Least Significant Bit based image steganography and …

Enhanced Recognition Based Image Authentication Scheme to Save System Time & Memory

ZI Khan, VK Shandilya - 2020 IEEE Bombay Section Signature …, 2020 - ieeexplore.ieee.org
This paper presents an authentication scheme that contains images, alphabets, numbers
and symbols. The primary aim of this research is to develop the authentication scheme using …

[PDF][PDF] Fingerprint and location based multifactor authentication for mobile applications

NA Aldumiji, EA Khan - International Journal of Engineering and …, 2019 - researchgate.net
Authentication, which involves the verification of identity, is one of the most important
security features. It usually depends on three factors: something you know (knowledge) …