Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • English 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Login
View Item 
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Institutional repository
All of DSpace
  • Communities & Collections
  • By Issue Date
  • Authors
  • Titles
  • Subjects

A novel Two-Factor HoneyToken Authentication Mechanism

Thumbnail
Author
Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C.
Date
2021
Language
en
DOI
10.1109/ICCCN52240.2021.9522319
Keyword
Computer networks
Authentication mechanisms
Computing system
Security mechanism
Security policy
Solution approach
Two factor authentication
Unauthorized access
User authentication
Authentication
Institute of Electrical and Electronics Engineers Inc.
Metadata display
Abstract
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regarding regular password replacement are a few problems that need to be addressed. The proposed research work aims at enhancing this security mechanism, prevent penetrations, password theft, and attempted break-ins towards securing computing systems. The selected solution approach is two-folded; it implements a two-factor authentication scheme to prevent unauthorized access, accompanied by Honeyword principles to detect corrupted or stolen tokens. Both can be integrated into any platform or web application with the use of QR codes and a mobile phone. © 2021 IEEE.
URI
http://hdl.handle.net/11615/77811
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    A review of rice authenticity/adulteration methods and results 

    Vlachos, A.; Arvanitoyannis, I. S. (2008)
    Rice importance resides in its high consumption mainly in Asia and Africa and less in the EU. Several cultivars, both GM and non-GM, have established themselves in various regions depending mainly on the climatic and soil ...
  • Thumbnail

    Χρήση ηλεκτροκαρδιογραφήματος για τη βιομετρική αυθεντικοποίηση χρηστών 

    Κατσίκα, Αγγελική Ι. (2018)
  • Thumbnail

    Implementation of quality control methods (physico-chemical, microbiological and sensory) in conjunction with multivariate analysis towards fish authenticity 

    Arvanitoyannis, I. S.; Tsitsika, E. V.; Panagiotaki, P. (2005)
    Nowadays authenticity of foods and fish in particular has become of crucial importance because of high number of adulteration cases. Authenticity control has gained ground thanks to the development of several rapid ...
htmlmap 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister (MyDspace)
Help Contact
DepositionAboutHelpContact Us
Choose LanguageAll of DSpace
EnglishΕλληνικά
htmlmap