Advance Security for Identifying Users without Their Login Ids
Keywords:
Cybersecurity, authentication, identification, PasswordAbstract
Authentication to a computing system is composed of two parts, identification and verification. Traditionally, login IDs have been used for identification and passwords for verification. The method that can augment the current password-based system by strengthening the identification process. It utilizes personal secret data instead of a login ID to identify a user uniquely. It then asks the user to choose a correct login ID among multiple choices of partially obscured IDs. Since it does not accept a login ID during the authentication process, a stolen or cracked password cannot be used for gaining an access to the computing system unless the attacker provides a correct identification material. Hence in this paper, provide more security in the system. The security can be provided using user authentication, device authentication and captcha as a protocol step.
References
R. Dhamija, and A. Perrig. “Déjà Vu: A User StudyUsing Images for Authentication”. In 9th USENIX Security Symposium, 2000.
Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
A. F. Syukri, E. Okamoto, and M. Mambo, "A User identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang.Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing.”
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy,,N.Memon, “Design and longitudinal evaluation of a>graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.
H. Zhao and X. Li, "S3PAS: A Scalable ShoulderSurfing Resistant Textual-Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472.
S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme,,”in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
