Professional Documents
Culture Documents
35 PDF
35 PDF
AUTHENTICATION
CONTENTS
Introduction
Authentication Schemes
Functionalities Required
3D Password selection and Input
Virtual Environment Design Guidelines
Applications
Security Analysis
Attacks and Countermeasures
Conclusion
References
INTRODUCTION
KNOWLEDGE BASED
• Recall based
• Recognition based
TOKEN BASED
eg : smart card
BIOMETRIC BASED
GRAPHICAL PASSWORDS
Recognition based
Recall based
FUNCTIONALITIES REQUIRED
Real-life similarity
System importance
APPLICATIONS
Critical servers.
Well-Studied Attack
Timing Attack
CONCLUSION
Commonly used authentication schemes are vulnerable to
attacks.
[5]I.Jermyn,A.Mayer,F.Monrose,M.K.Reiter,and A.D.Rubin,
“The design and analysis of 3D passwords,” Special Issue on
HCI Research in Privacy and Security,vol. 63,July 2005,pp.102-
127.