By Topic

Two dimensional password based hybrid authentication methods in vulnerable workflows

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Safdar, S. ; Dept. of Comput. & Inf. Sci., Univ. Teknol. PETRONAS, Tronoh, Malaysia ; Hassan, M.F.

The main objective of the research is to propose the hybrid methods for secure authentication methods using two-dimensional nxn passwords. When an intrusion attack strikes the system then its services have to be truncated and system become unavailable temporarily. To make the system available to the end user in the vulnerable state, the specialized access control should be in place. Therefore, specialized and secure authentication methods are required. Authenticating through these methods, users can become active again to the system and considered as safe. The long and complex nxn passwords are used and considered to be very useful in certain alarming situations such as the system being under threat. Proposed hybrid methods works on the two portions of the password that is server generated part and user created part and ensure the secure authentication to the system resources that is under threat. Proposed methods are classified on the basis of symmetrical displacement of server generated part and user created part of the password. The strength and limitations of all the proposed methods have also been analyzed.

Published in:

Computer & Information Science (ICCIS), 2012 International Conference on  (Volume:2 )

Date of Conference:

12-14 June 2012