A novel Two-Factor HoneyToken Authentication Mechanism
Ημερομηνία
2021Γλώσσα
en
Λέξη-κλειδί
Επιτομή
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regarding regular password replacement are a few problems that need to be addressed. The proposed research work aims at enhancing this security mechanism, prevent penetrations, password theft, and attempted break-ins towards securing computing systems. The selected solution approach is two-folded; it implements a two-factor authentication scheme to prevent unauthorized access, accompanied by Honeyword principles to detect corrupted or stolen tokens. Both can be integrated into any platform or web application with the use of QR codes and a mobile phone. © 2021 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A review of rice authenticity/adulteration methods and results
Vlachos, A.; Arvanitoyannis, I. S. (2008)Rice importance resides in its high consumption mainly in Asia and Africa and less in the EU. Several cultivars, both GM and non-GM, have established themselves in various regions depending mainly on the climatic and soil ... -
Χρήση ηλεκτροκαρδιογραφήματος για τη βιομετρική αυθεντικοποίηση χρηστών
Κατσίκα, Αγγελική Ι. (2018) -
Implementation of quality control methods (physico-chemical, microbiological and sensory) in conjunction with multivariate analysis towards fish authenticity
Arvanitoyannis, I. S.; Tsitsika, E. V.; Panagiotaki, P. (2005)Nowadays authenticity of foods and fish in particular has become of crucial importance because of high number of adulteration cases. Authenticity control has gained ground thanks to the development of several rapid ...


