2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on A 2018
DOI: 10.1109/scis-isis.2018.00093
|View full text |Cite
|
Sign up to set email alerts
|

Integrating the Dynamic Password Authentication with Possession Factor and CAPTCHA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The above categories were derived from research by Monrose and Rubin (2000), Pansa and Chomsiri (2018), Sawant et al (2013) and Teh et al (2013). Both passwords and passphrases are grouped into the knowledge category (Sawant et al , 2013).…”
Section: User Authentication Definedmentioning
confidence: 99%
“…The above categories were derived from research by Monrose and Rubin (2000), Pansa and Chomsiri (2018), Sawant et al (2013) and Teh et al (2013). Both passwords and passphrases are grouped into the knowledge category (Sawant et al , 2013).…”
Section: User Authentication Definedmentioning
confidence: 99%
“…While these multi-factor methods may help obscure access control, they do not always prevent information, such as the password or password-hash itself, from being stolen. Since users tend to re-use passwords across websites, this threat still exists as not every website has implemented 2FA/MFA protections [ 10 , 11 , 17 , 18 , 19 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…While proposed solutions have varied significantly, countermeasures that are derivative of current paradigms are more widely agreed upon. Beside the previously mentioned user education and minimum password requirements, typically-accepted countermeasures include tokenization, or shift from ‘static’ passwords to ‘dynamic’ passwords, generally presented in a similar fashion to MFA PINs [ 11 , 12 , 17 , 18 , 19 ]. Other countermeasures include reactive password checking, heightened access control, stronger password hashing and salting, and complex, generated passwords [ 8 , 16 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 1 more Smart Citation