Secure Authentication Schemes

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical passwords lack security due to hotspot coverage or attacker can record the password using camera. Token-based approach can be lost or stolen. Biometric systems cannot be changed. Later another security method emerges which combines the above methods into one scheme forming a 3-D password. 3-D password is a multidimensional authentication scheme providing a virtual environment.
Download Now

Find By Topic