Research on the Network Security and Identity Authentication Technology

Article Preview

Abstract:

Network security and identity authentication is confirmed the true identity whether the user and the claimed identity is consistent or not, in order to prevent the illegal user access the system for resources by identity fraud. The one-time password authentication technology with high safety, convenient for using, easy for management and lower cost is applied widely and has bright prospection. The one-time password authentication technology support to add uncertain factors in the login process, so that the login authentication informations are not the same each time. It is useful to improve the security of the login process. In this paper, a new system which is based on the the one-time password authentication technology called biometric system is first introduced. Then the framework of multi-biometric system is presented, and several examples are also shown. The prospect about multi-biometric fusion is also given.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

2819-2822

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] C. C. Lee, L. H. Li, and M. S. Hwang, A remote user authentication scheme using hash functions, ACM Operating Systems Review, 2002, vol. 36, no. 4, pp.23-29.

DOI: 10.1145/583800.583803

Google Scholar

[2] Wei-Chi Ku, Chien-Ming Chen and Hui-Lung Lee, Weaknesses of Lee-Li-Hwang's Hash-Based Password Authentication Scheme, ACM Operating Systems Review, 2003, vol. 37, no. 4, pp.19-25.

DOI: 10.1145/958965.958967

Google Scholar

[3] J. Xu, W. T. Zhu, and D. G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards & Interfaces, vol. 31, no. 4, pp.723-728, (2009).

DOI: 10.1016/j.csi.2008.09.006

Google Scholar

[4] S. K. Sood, A. K. Sarje, and K. Singh, An improvement of Xu et al. s authentication scheme using smart cards, Proceedings of the Third Annual ACM Bangalore Conference, no. 15, pp.1-5, Bangalore, India, (2010).

DOI: 10.1145/1754288.1754303

Google Scholar

[5] S. K. Sood, A. K. Sarje, and K. Singh, Dynamic identity based single password anti-phishing protocol, Security and Communication Networks, Accepted, doi. wiley. com/10. 1002/sec. 169, Oct. (2009).

DOI: 10.1002/sec.169

Google Scholar

[6] S. K. Sood, A. K. Sarje, and K. Singh, Secure dynamic identity based remote user authentication scheme, Sixth International Conference on Distributed Computing and Internet Technology, LNCS 5966, pp.224-235, Springer-Verlag, (2010).

DOI: 10.1007/978-3-642-11659-9_25

Google Scholar

[7] S. K. Sood, A.K. Sarje, and K. Singh, Inverse cookie based virtual password authentication protocol, International Journal of Network Security, vol. 12, no. 3, pp.292-302, (2011).

Google Scholar