Security Assurance by Efficient Password Based Authentication

At present, identity theft is one of the most prevalent security threats.Authentication is an inevitable process of...
Dhs. 161.55 AED
Dhs. 161.55 AED
SKU: 9786503431152
Product Type: Books
Please hurry! Only 444 left in stock
Author: Amanpreet Kaur Chandok
Format: Paperback
Language: English
Subtotal: Dhs. 161.55
10 customers are viewing this product
Security Assurance by Efficient Password Based Authentication by Chandok, Amanpreet Kaur

Security Assurance by Efficient Password Based Authentication

Dhs. 161.55

Security Assurance by Efficient Password Based Authentication

Dhs. 161.55
Author: Amanpreet Kaur Chandok
Format: Paperback
Language: English

At present, identity theft is one of the most prevalent security threats.

Authentication is an inevitable process of verifying an individual's identity, who

wants to access the resources of a system. Though, machine authentication (machinemachine

authentication) is to protect the machine through several secure protocols

like Secure Socket Layer (SSL) but it cannot stop all the illegal accesses. In order,

user authentications come to rescue, and consequently we witness stringent policies to

avoid identity theft. Every framework has different authentication arrangements to

include different authentication techniques. The ultimate objective of authentication is

to increase the security level of authorized users and to eliminate the unauthorized

accesses, whatsoever authentication technique is employed.

The classification of authentication techniques is based on three zones:

Knowledge Based Authentication (KBA), Object Based Authentication (OBA), and

Characteristics Based Authentication (CBA). KBA includes user-id and password,

passphrase, challenge questions, zero knowledge-based protocols, challenge response

protocols etc. OBA is described by the physical belonging or utilization of any

hardware device used to verify the user for example smart cards, identity cards etc. It

is employed generally in banking, transport, parking and hotels (Levy & Ramim

2009). The trouble of misplacing the device and allowing unauthorized access can be

explained by embedding other factors into it. CBA or Biometrics is characterized by

unique property a user possesses, including fingerprint, audio or voice recognition,

signature recognition and face recognition. Kaur and Mustafa (2016) also discussed

various authentication mechanism and authentication methods. Their respective

strengths and weaknesses are briefly listed in Table 1a.

Despite security problems, password authentication has been having increasing

influence on the internet for the last five decades. Several researchers have worked for

strengthening password based authentication, primarily to enhance effectiveness.

However, a comprehensive literature review revealed a little attempt on improving the

efficiency aspect of password based authentication- including changing the time

2

computations, increasing the security considerations etc. More work needs to be done

for determining the distinction with, which users act to specific authentication

techniques in reference with authentication practices, that may enable attacks on the

system. Consequently, the circumstances and prevailing context are pressing hard the

need for effective and efficient authentication means.



Author: Amanpreet Kaur Chandok
Publisher: Ary Publisher
Published: 12/21/2022
Pages: 112
Binding Type: Paperback
Weight: 0.35lbs
Size: 9.00h x 6.00w x 0.23d
ISBN: 9786503431152

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products