Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection
Abstract
Full Text:
PDFReferences
Ah Kioon, M. C., Wang, Z. S., & Deb Das, S. (2013). Security analysis of MD5 algorithm in password storage. In Applied Mechanics and Materials 347. 2706-2711p. Trans Tech Publications Ltd.
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014, June). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In International conference on human aspects of information security, privacy, and trust. 115-126p. Springer, Cham.
Boonkrong, S., & Somboonpattanakit, C. (2016). Dynamic salt generation and placement for secure password storing. IAENG International Journal of Computer Science, 43(1), 27-36p.
Kelsey, J., Schneier, B., Hall, C., & Wagner, D. (1997, September). Secure applications of low-entropy keys. In International Workshop on Information Security .121-134p. Springer, Berlin, Heidelberg.
Van Oorschot, P. C., & Wiener, M. J. (1996, May). On Diffie-Hellman key agreement with short exponents. In International Conference on the Theory and Applications of Cryptographic Techniques.332-343p. Springer, Berlin, Heidelberg.
Shay, R., Komanduri, S., Durity, A. L., Huh, P., Mazurek, M. L., Segreti, S. M., ... & Cranor, L. F. (2016). Designing password policies for strength and usability. ACM Transactions on Information and System Security (TISSEC), 18(4), 1-34.
Multi Factor Authentication [Online]
https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA
Global Information Assurance Certification Paper: Dec. 15, 2012. [Online]. https://www.giac.org/paper/gsec/594/authentication-mechanisms-best/101431
Wang, D., He, D., Cheng, H., & Wang, P. (2016, June). fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 595-606). IEEE.
Sun, H. M., Chen, Y. H., & Lin, Y. H. (2011). oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Transactions on Information Forensics and Security, 7(2), 651-663.
Refbacks
- There are currently no refbacks.