Authentication Mechanism - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Authentication Mechanism

The Experts below are selected from a list of 11496 Experts worldwide ranked by ideXlab platform

Karen Renaud – 1st expert on this subject based on the ideXlab platform

  • BCS HCI – A Visuo-Biometric Authentication Mechanism for Older Users
    People and Computers XIX — The Bigger Picture, 2020
    Co-Authors: Karen Renaud

    Abstract:

    The Web is an invaluable resource for users of all ages, but it especially offers facilities which can make a huge difference to the lives of elderly users, many of whom have to contend with limited mobility and frequent illness. Whereas there is some understanding of the issues that pertain to designing websites for this group of users, the issue of specialized Web Authentication has not received much attention. Web Authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password, and indeed Authentication is seldom tailored to the needs of either the site or the target users. Sites are seldom subjected to a risk analysis before an Authentication Mechanism is chosen. This paper proposes a technique for matching the risk levels of a website to the security rating of an Authentication Mechanism and presents an Authentication Mechanism that is tailored to the needs of elderly users for protecting sites with a low risk rating. Usage data from a field test of this Mechanism is reported, which show that the Mechanism is indeed feasible and meets older users’ needs.

  • guidelines for designing graphical Authentication Mechanism interfaces
    International Journal of Information and Computer Security, 2009
    Co-Authors: Karen Renaud

    Abstract:

    The password era is drawing to a close. The latest technology is being released without keyboards, which makes password entry insecure and arduous. Furthermore, everyone is straining under the burden of multiple passwords and Personal Identification Numbers (PINs), and a viable knowledge-based alternative is urgently required. In the last few years a number of innovative graphical Authentication Mechanisms, which use pictures instead of alphanumeric strings, have been proposed. There is long-standing evidence that people remember pictures far better than they remember alphanumeric strings, so in terms of easing the memory load, pictures seem to offer a viable alternative. However, what is emerging from current research is that the design of such a graphical Authentication Mechanism interface can either make or break it, both in terms of security and usability. This paper will discuss various design options and make recommendations about how such systems should be designed in order to make them maximally efficacious while considering the level of risk associated with the resource being protected by the Mechanism.

  • A process for supporting risk-aware web Authentication Mechanism choice
    Reliability Engineering & System Safety, 2007
    Co-Authors: Karen Renaud

    Abstract:

    Web Authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password. Indeed, Authentication is seldom tailored to the needs of either the site or the target users. This paper does an in-depth analysis of all the vulnerabilities of Authentication Mechanisms, and proposes a structured and simple process which, if followed, will enable developers to choose a web Authentication Mechanism so that it matches the needs of their particular site.

Tai-myoung Chung – 2nd expert on this subject based on the ideXlab platform

  • ICSNC – Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment
    2008 Third International Conference on Systems and Networks Communications, 2008
    Co-Authors: Tai-myoung Chung

    Abstract:

    In the current specification of Proxy Mobile IPv6, there is no attempts for optimized Authentication Mechanism. In this paper, we propose a ticket-based Authentication Mechanism in where the security information are reused for fast Authentication during mobile nodes hand off between different links. According to the performance evaluation, the proposed Mechanism shows the improved performance up to 89.2% compared to EAP-TLS and Kerberos. In addition, we provide the validity of the proposed Mechanism through BAN logic.

  • Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment
    2008 Third International Conference on Systems and Networks Communications, 2008
    Co-Authors: Tai-myoung Chung

    Abstract:

    In the current specification of Proxy Mobile IPv6, there is no attempts for optimized Authentication Mechanism. In this paper, we propose a ticket-based Authentication Mechanism in where the security information are reused for fast Authentication during mobile nodes hand off between different links. According to the performance evaluation, the proposed Mechanism shows the improved performance up to 89.2% compared to EAP-TLS and Kerberos. In addition, we provide the validity of the proposed Mechanism through BAN logic.

Chiayi Ku – 3rd expert on this subject based on the ideXlab platform

  • a new ticket based Authentication Mechanism for fast handover in mesh network
    PLOS ONE, 2016
    Co-Authors: Pujen Cheng, Chiayi Ku

    Abstract:

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual Authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover Authentication Mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover Authentication Mechanism. The new Mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new Mechanism is superior to some similar Mechanisms in terms of Authentication delay.