• English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • español 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Login
Ver ítem 
  •   DSpace Principal
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Ver ítem
  •   DSpace Principal
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Ver ítem
JavaScript is disabled for your browser. Some features of this site may not work without it.
Todo DSpace
  • Comunidades & Colecciones
  • Por fecha de publicación
  • Autores
  • Títulos
  • Materias

A novel Two-Factor HoneyToken Authentication Mechanism

Thumbnail
Autor
Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C.
Fecha
2021
Language
en
DOI
10.1109/ICCCN52240.2021.9522319
Materia
Computer networks
Authentication mechanisms
Computing system
Security mechanism
Security policy
Solution approach
Two factor authentication
Unauthorized access
User authentication
Authentication
Institute of Electrical and Electronics Engineers Inc.
Mostrar el registro completo del ítem
Resumen
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regarding regular password replacement are a few problems that need to be addressed. The proposed research work aims at enhancing this security mechanism, prevent penetrations, password theft, and attempted break-ins towards securing computing systems. The selected solution approach is two-folded; it implements a two-factor authentication scheme to prevent unauthorized access, accompanied by Honeyword principles to detect corrupted or stolen tokens. Both can be integrated into any platform or web application with the use of QR codes and a mobile phone. © 2021 IEEE.
URI
http://hdl.handle.net/11615/77811
Colecciones
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]

Ítems relacionados

Mostrando ítems relacionados por Título, autor o materia.

  • Thumbnail

    A review of rice authenticity/adulteration methods and results 

    Vlachos, A.; Arvanitoyannis, I. S. (2008)
    Rice importance resides in its high consumption mainly in Asia and Africa and less in the EU. Several cultivars, both GM and non-GM, have established themselves in various regions depending mainly on the climatic and soil ...
  • Thumbnail

    Χρήση ηλεκτροκαρδιογραφήματος για τη βιομετρική αυθεντικοποίηση χρηστών 

    Κατσίκα, Αγγελική Ι. (2018)
  • Thumbnail

    Implementation of quality control methods (physico-chemical, microbiological and sensory) in conjunction with multivariate analysis towards fish authenticity 

    Arvanitoyannis, I. S.; Tsitsika, E. V.; Panagiotaki, P. (2005)
    Nowadays authenticity of foods and fish in particular has become of crucial importance because of high number of adulteration cases. Authenticity control has gained ground thanks to the development of several rapid ...
htmlmap 

 

Listar

Todo DSpaceComunidades & ColeccionesPor fecha de publicaciónAutoresTítulosMateriasEsta colecciónPor fecha de publicaciónAutoresTítulosMaterias

Mi cuenta

AccederRegistro
Help Contact
DepositionAboutHelpContacto
Choose LanguageTodo DSpace
EnglishΕλληνικά
htmlmap