2,273 research outputs found

    A Novel Method for Graphical Password Mechanism

    Get PDF
    For the verification of authorized users in computer systems, various text based or biometrics methods are used. But these methods have some drawbacks. It is difficult to remember and recall the textual i.e. alphanumeric passwords. To avoid this drawback users prefer to create effortless, short, easy and insecure passwords which are easily guessable by hacker and this makes the system more vulnerable to attacks. On other hand, verification mechanisms based on biometrics offers security to a good extents. But they are quite luxurious for implementation. Cost becomes a key factor in the case of biometrics. Also any injury to the body part used in biometric authorization results in denial of access or performance issues. Graphical password provides another way by providing passwords that are more protected and unforgettable in a reasonable price. In this system, user clicks on images instead of typing passwords for accessing the system. This paper describes and examines usability and security of graphical password mechanism for authentication using graphical passwords. Proposed system describes characteristics for security and performed empirical study comparing Graphical password mechanism with Biometric passwords and alphanumeric password. DOI: 10.17762/ijritcc2321-8169.15013

    Biometric identity-based cryptography for e-Government environment

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
    • …
    corecore