2018 International Conference on Advanced Science and Engineering (ICOASE) 2018
DOI: 10.1109/icoase.2018.8548915
|View full text |Cite
|
Sign up to set email alerts
|

PAC-RMPN: Password Authentication Code Based RMPN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This work has tested to know the efficiency of our method. The differences of performance for scheme [1] and E-PAC as shown in the Figure 4 and Figure 5. Additionally, the average time for the authentication processes in this method is equal to 0.022319 seconds for each user compares with the last one which is equal to 0.005282 that refer to high speed and the difference is very little. )…”
Section: Performace Schemementioning
confidence: 99%
See 1 more Smart Citation
“…This work has tested to know the efficiency of our method. The differences of performance for scheme [1] and E-PAC as shown in the Figure 4 and Figure 5. Additionally, the average time for the authentication processes in this method is equal to 0.022319 seconds for each user compares with the last one which is equal to 0.005282 that refer to high speed and the difference is very little. )…”
Section: Performace Schemementioning
confidence: 99%
“…This method used to distinguish the unauthorized user do not allow to access a specific resources. When the users used the internet applications so the password should be top secret key that nobody could guess [1]. Many users use password that is very easy and restricted alphanumeric such as their phone numbers and names [2].…”
Section: Introductionmentioning
confidence: 99%
“…The most common problem that occurs in online applications by users when the password is repeated in more than one application [1,2]. Multiple passwords can lead to forgetting, so the user must try again and again for the purpose of obtaining it, and therefore this will negatively affect his security, as it gives an opportunity for attackers to increase the possibility of obtaining a number of passwords belonging to the user [2].…”
Section: Introductionmentioning
confidence: 99%