Open Access   Article Go Back

Advance Security for Identifying Users without Their Login Ids

Manjunath R1 , Suresha T G2 , Ashok Kumar P S3

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 143-146, May-2016

Online published on Jun 07, 2016

Copyright © Manjunath R, Suresha T G , Ashok Kumar P S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manjunath R, Suresha T G , Ashok Kumar P S, “Advance Security for Identifying Users without Their Login Ids,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.143-146, 2016.

MLA Style Citation: Manjunath R, Suresha T G , Ashok Kumar P S "Advance Security for Identifying Users without Their Login Ids." International Journal of Computer Sciences and Engineering 04.03 (2016): 143-146.

APA Style Citation: Manjunath R, Suresha T G , Ashok Kumar P S, (2016). Advance Security for Identifying Users without Their Login Ids. International Journal of Computer Sciences and Engineering, 04(03), 143-146.

BibTex Style Citation:
@article{R_2016,
author = {Manjunath R, Suresha T G , Ashok Kumar P S},
title = {Advance Security for Identifying Users without Their Login Ids},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {143-146},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=81},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=81
TI - Advance Security for Identifying Users without Their Login Ids
T2 - International Journal of Computer Sciences and Engineering
AU - Manjunath R, Suresha T G , Ashok Kumar P S
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 143-146
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

Authentication to a computing system is composed of two parts, identification and verification. Traditionally, login IDs have been used for identification and passwords for verification. The method that can augment the current password-based system by strengthening the identification process. It utilizes personal secret data instead of a login ID to identify a user uniquely. It then asks the user to choose a correct login ID among multiple choices of partially obscured IDs. Since it does not accept a login ID during the authentication process, a stolen or cracked password cannot be used for gaining an access to the computing system unless the attacker provides a correct identification material. Hence in this paper, provide more security in the system. The security can be provided using user authentication, device authentication and captcha as a protocol step.

Key-Words / Index Term

Cybersecurity, authentication, identification, Password

References

[1] R. Dhamija, and A. Perrig. “Déjà Vu: A User StudyUsing Images for Authentication”. In 9th USENIX Security Symposium, 2000.
[2] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
[3] A. F. Syukri, E. Okamoto, and M. Mambo, "A User identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[4] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang.Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing.”
[5] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy,,N.Memon, “Design and longitudinal evaluation of a>graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.
[6] H. Zhao and X. Li, "S3PAS: A Scalable ShoulderSurfing Resistant Textual-Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472.
[7] S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme,,”in Proceedings of International conference on security and management. Las Vegas, NV, 2003.