Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials... more
The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often... more
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user- friendly password-based method has been on the agenda of security researchers for a long... more
The Distributed Computing Column covers the theory of systems that are composed of a number of interacting computing elements. These include problems of communication and networking, databases, distributed shared memory, multiprocessor... more
Passwords tend to be one of the most popular approaches to protect operating systems and user’s data also. Most businesses rely on password protection schemes, and secure passwords are incredibly necessary to them. The proposed model... more
In this paper, we propose a remote password authentication scheme based on geometry. We use some simple tangent theorems of a circle, RSA encryption technique, and a strong one-way function to mutually authenticate the user and the... more
We examine the issue of password length leakage via encrypted traffic i.e., bicycle attacks. We aim to quantify both the prevalence of password length leakage bugs as well as the potential harm to users. In an observational study, we find... more
Mobile banking has become an integral part of modern society's life. However, the authentication method used still has various security gaps, especially in OTP (One-Time Password) based systems sent via SMS. This research proposes a... more
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy.... more
This thesis is dedicated to my father, who taught me that the best kind of knowledge to have is that which is learned for its own sake. It is also dedicated to my mother, who taught me that even the largest task can be accomplished if it... more
We study protocols for strong authentication and key exchange in asymmetric scenarios where the authentication server possesses ~a pair of private and public keys while the client has only a weak human-memorizable password as its... more
The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking... more
In this paper author presents an approach to minimize shoulder surfing attack (SSA). Information available and security of computers are supported mostly by passwords which play the important role in verification process. The (PIN)... more
In the current scenario, the crime rate has tremendously increased with respect to the Automatic Teller Machine (ATM). During the last few years, criminals are becoming more sophisticated and paid more attention to ATMs. The majority of... more
Today, user authentication is one of the important topics in computer era. Powerful text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to remember sometimes... more
In this paper, we propose a remote password authentication scheme based on geometry. We use some simple tangent theorems of a circle, RSA encryption technique, and a strong one-way function to mutually authenticate the user and the... more
People enjoy the convenience of on-line services, but online environments may bring many risks. We propose a virtual password concept involving a small amount of human computing to secure users’ passwords in on-line environments. We adopt... more
Passwords play an important role in daily life in various computing applications like ATM machines, internet services, windows login, authentication in mobiles etc. The major aim for using passwords is to restrict unauthorized users to... more
This paper describes the development of an authentication system with Internet of Things (IOT) enabled solution and the dashboard support with mobile applications. This Authentication system is composed of NI myRIO embedded controller... more
The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In this type of system, the authorized user may login to a distant server to acquire the service and resources they demand, we need full... more
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a userfriendly password-based method has been on the agenda of security researchers for a long... more
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user- friendly password-based method has been on the agenda of security researchers for a long... more
A password is a string of alphanumeric elements that is used mainly to authenticate user identity in order to give permission gaining access to the computer resources that should be secured from any unauthorized access. For this reason,... more
The significance of digital information security has been enhanced due to the boost of internet communication. Providing security for server client communication over the internet is a critical issue due to open world digital... more
Understanding the Challenges of Cryptography-Related Understanding the Challenges of Cryptography-Related Cybercrime and Its Investigation Cybercrime and Its Investigation cybercrime; darknet market; cryptocurrency; kerberoasting;... more
Purpose-One-time password systems provide great strengths over conventional password systems: protection against over-the-shoulder, eavesdropping, replay, etc. The Grid Data Security authentication system is a server-challenge-based... more
Large-scale password data breaches are becoming increasingly commonplace, which has enabled researchers to produce a substantial body of password security research utilising real-world password datasets, which often contain numbers of... more
The choice of password composition policy to enforce on a password-protected system represents a critical security decision, and has been shown to significantly affect the vulnerability of user-chosen passwords to guessing attacks. In... more
In multiserver (MS) environments, it is preferable for a remote user to login to different service provider servers by keying in the same password. Recently, Wang et al. proposed an improvement on the dynamic identity-based smart card... more
Security of financial transactions in E-Commerce is difficult to implement and there is a risk that user's confidential data over the internet may be accessed by hackers. Unfortunately, interacting with an online service such as a banking... more
In this study, we propose a practical and secure hash functionbased password authentication scheme using smart cards. Our proposed scheme offers some advantages and interesting features. Firstly, the scheme does not require a verification... more
The traditional Visual Sharing Scheme is used for securely transmitting or delivering the secret images across the network. In this scheme the secret images is split into n shares and distributed among the participants. These shares can... more
Due to the advancement in science and technology all over the world, there is a significant increase in the rate of crime and sophistication in crimes; as a result, it is necessary to ensure the security of one’s self and one’s valuable... more
Identity theft, privacy invasion, loss of key information is the major reasons for which E-mail security is breached these days. Hence, it is very essential that effective security prevention measures are taken. This paper, proposes many... more
We introduce the Destructive Object Handling (DOH) problem, which models aspects of many real-world allocation problems, such as shipping explosive munitions, scheduling processes in a cluster with fragile nodes, re-using passwords across... more
Today, the traditional username and password systems are becoming less popular on the internet due to their vulnerabilities. These systems are prone to replay attacks and eavesdropping. During the Coronavirus pandemic, most of the... more
To enhance the usability of password authentication, typo-tolerant password authentication schemes permit certain deviations in the user-supplied password, to account for common typographical errors yet still allow the user to... more
To enhance the usability of password authentication, typo-tolerant password authentication schemes permit certain deviations in the user-supplied password, to account for common typographical errors yet still allow the user to... more
Many security primitives are based on difficult mathematical problems. Using hard AI problems for security is emerging as an new standard, but has been underexplored. As AI-complete problems cannot be solved by computer alone, but also... more
In today’s world, online payment system is one of the essential requirements of people. Security in online transactions is still a major challenge for the researchers. This work is emphasizing on providing highly secure environment for... more
Traditional authentication technique generally requires an id and password to verify the identity of user. By nature, user is looking for a password that is easy to remember and secured from any attack. However, remembering many... more
Hash functions are the swiss army knife of cryptographers. They are used to generate unique identifiers in hash-and-sign signatures, as one-way functions for onetime-password, to break the structure of the input in key derivation... more
Traditional authentication technique generally requires an id and password to verify the identity of user. By nature, user is looking for a password that is easy to remember and secured from any attack. However, remembering many... more
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords... more
In 2013, Tsai et al. cryptanalyzed Yeh et al. scheme and shown that Yeh et al., scheme is vulnerable to various cryptographic attacks and proposed an improved scheme. In this poster we will show that Tsai et al., scheme is also vulnerable... more
Web pages are secured by one-tier security constraints based on username and password. This one-tier security module is the only way to protect the web pages from hackers. However, the one-tier security constraints on web service... more
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication... more
The world is vastly becoming a completely digital one with most transactions carried out over the internet. This has exposed the internet to increasing threats and attacks and has necessitated the need for an internet-based authentication... more