2015
DOI: 10.14569/ijacsa.2015.060826
|View full text |Cite
|
Sign up to set email alerts
|

Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

Abstract: Abstract-With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 35 publications
0
18
0
1
Order By: Relevance
“…Several methods have been put forward by researchers that replace the usage of complex passwords with smart cards, hardware tokens and chip modules [15][16][17] that offer enhanced security but have proven to be inconsistent, lack in user ergonomics and may be stolen, duplicated, lost or are difficult to manage or expensive thereby restricting their adoptability [14], [18]. In addition to this, security schemes in [19], [20] also exist that fail to function on devices with restricted resources like mobile phones which are mostly used for exchanging crucial information online thus making them highly susceptible [1], [21]. Besides, various facilities such as cloud technology focus on providing services to its users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several methods have been put forward by researchers that replace the usage of complex passwords with smart cards, hardware tokens and chip modules [15][16][17] that offer enhanced security but have proven to be inconsistent, lack in user ergonomics and may be stolen, duplicated, lost or are difficult to manage or expensive thereby restricting their adoptability [14], [18]. In addition to this, security schemes in [19], [20] also exist that fail to function on devices with restricted resources like mobile phones which are mostly used for exchanging crucial information online thus making them highly susceptible [1], [21]. Besides, various facilities such as cloud technology focus on providing services to its users.…”
Section: Related Workmentioning
confidence: 99%
“…In the process of examining various mechanisms that were taken up in the past and existing systems, it was observed that the utilization of OTP appears to promise enhanced access management security in private and public network [21]. While performing a transaction unit, OTP is valid for a single attempt of access.…”
Section: Related Workmentioning
confidence: 99%
“…Since the hash value is irreversible, data integrity & security is guaranteed. Now, at the receiver end, for determining the S-Box to be used, the secret key is iteratively divided by the no's (1)(2)(3)(4)(5)(6)(7)(8)(9)(10) and the corresponding hash values are stored in an array. The hash value that is received at the receiver end is compared with the hash values in the array.…”
Section: C) Selection Of S-boxmentioning
confidence: 99%
“…Even number of one's, so R2 = 0. R3 = c [3] = c [3]k [4]k [5]k [6]k [2]k [1] = Even number of one's, so R3 = 0. R4 = c [4]k [4]k [5]k [6]k [7] = 10111 R4 = 0 R5 = c [5]k [4]k [5]k [6]k [7]k [8] = 001110 [6]k [4]k [5]k [6]k [7]k [8]k [1] = 0011101 R6 = 0 R7 = c [7]k [4]k [5]k [6]k [7]k [8]k [1]k [2] = 00111010 R7 = 0 R8 = c [8]k [4]k [5]k [6]k [7]k [8]k [1]k [2]k [3] = 001110101…”
Section: R2 = C[2]k[(1+3)%8]k[(2+3)%8]k[(5+3)%8]k[(6+3)%8]unclassified
See 1 more Smart Citation