Abstract:
In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of...Show MoreMetadata
Abstract:
In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.
Published in: 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)
Date of Conference: 07-09 April 2022
Date Added to IEEE Xplore: 27 April 2022
ISBN Information: