Authors
Syed Akram, Mohammed Misbahuddin, G Varaprasad
Publication date
2012/1/1
Journal
Information Security Journal: A Global Perspective
Volume
21
Issue
4
Pages
169-182
Publisher
Taylor & Francis Group
Description
There are many secure authentication schemes that are secure but difficult to use. Most existing network applications authenticate users with a username and password pair. Such systems using the reusable passwords are susceptible to attacks based on the theft of password. Each scheme has its merits and drawbacks . To overcome the susceptibility in the existing applications, there is an authentication mechanism known as Two-Factor Authentication. Two-Factor Authentication is a process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. It is a system wherein two different factors are used in conjunction to authenticate. Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. The proposed scheme allows users to freely choose their PassFile (file password) instead of remembering the password …
Total citations
2014201520162017201820192020202120221111111
Scholar articles
S Akram, M Misbahuddin, G Varaprasad - Information Security Journal: A Global Perspective, 2012