Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2016, Article ID 6105053, 5 pages
http://dx.doi.org/10.1155/2016/6105053
Research Article

Access to Network Login by Three-Factor Authentication for Effective Information Security

1Research Scholar, Sathyabama University, Chennai 600119, India
2Research Supervisor, Sathyabama University, Chennai 600119, India
3Faculty of Operations & Systems, IBS, Hyderabad 501203, India

Received 5 November 2015; Revised 5 January 2016; Accepted 14 January 2016

Academic Editor: Michele Nappi

Copyright © 2016 S. Vaithyasubramanian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. F. Gehringer, “Choosing passwords: security and human factors,” in Proceedings of the IEEE International Symposium on Technology and Society (ISTAS '02), pp. 369–373, Raleigh, NC, USA, June 2002. View at Scopus
  2. D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proceedings of the 16th International World Wide Web Conference (WWW'07), pp. 657–666, ACM, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Florencio, C. Herley, and B. Coskun, “Do strong web passwords accomplish anything?” in Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, ACM Digital Library, August 2007.
  4. Z. Mao, D. Florêncio, and C. Herley, “Painless migration from passwords to two factor authentication,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), pp. 1–6, IEEE, Iguacu Falls, Brazil, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Dmitrienko, C. Liebchen, C. Rossow, and A.-R. Sadeghi, “On the (In)Security of mobile two-factor authentication,” in Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3–7, 2014, Revised Selected Papers, vol. 8437 of Lecture Notes in Computer Science, pp. 365–383, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar
  6. J. Hong and D. Reed, “Passwords getting painful, computing still blissful,” Communications of the ACM, vol. 56, no. 3, pp. 10–11, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Owens and J. Matthews, “A study of passwords and methods used in brute force SSH attack,” in Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '08), 2008.
  8. M. Raza, M. Iqbal, M. Sharif, and W. Haider, “A survey of password attacks and comparative analysis on methods for secure authentication,” World Applied Sciences Journal, vol. 19, no. 4, pp. 439–444, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Alsaleh, M. Mannan, and P. C. van Oorschot, “Revisiting defenses against large-scale online password guessing attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 1, pp. 128–141, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. http://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA.
  11. http://www.ghacks.net/2013/10/26/4-simple-password-creation-rules-x-common-sense-tips/.
  12. S. Vaithyasubramanian and A. Christy, “A scheme to create secured random password using markov chain,” in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2, vol. 325 of Advances in Intelligent Systems and Computing, pp. 809–814, Springer, New Delhi, India, 2015. View at Publisher · View at Google Scholar
  13. S. Vaithyasubramanian, A. Christy, and D. Lalitha, “Generation of array passwords using Petri net for effective network and information security,” in Intelligent Computing, Communication and Devices, L. C. Jain, S. Patnaik, and N. Ichalkaranje, Eds., vol. 308 of Advances in Intelligent Systems and Computing, pp. 189–200, Springer India, 2014. View at Publisher · View at Google Scholar
  14. S. Vaithyasubramanian and A. Christy, “Authentication using string generated from chomsky hierarchy of formal grammars,” International Journal of Applied Engineering Research, vol. 10, no. 8, pp. 6269–6273, 2015. View at Google Scholar
  15. S. Vaithyasubramanian, A. Christy, and D. Lalitha, “Two factor authentication for secured login using array password engender by Petri net,” Procedia Computer Science, vol. 48, pp. 313–318, 2015. View at Publisher · View at Google Scholar
  16. http://searchsecurity.techtarget.com/definition/biometric-authentication.
  17. S. M. S. Ahmad, B. M. Ali, and W. A. W. Adnan, “Technical issues and challenges of biometric applications as access control tools of information security,” International Journal of Innovative Computing, Information and Control, vol. 8, no. 11, pp. 7983–7999, 2012. View at Google Scholar
  18. M. Bhatnagar, R. K. Jain, and N. S. Khairnar, “A survey on behavioral biometric techniques: mouse vs. Keyboard dynamics,” in Proceedings of the International Conference on Recent Trends in Engineering and Technology (IJCA '13), pp. 27–30, 2013.
  19. http://searchsecurity.techtarget.com/definition/graphical-password.
  20. S. Wiedenbech, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: basic results,” in Proceedings of the 11th International Conference on Human-Computer Interaction (HCII 05), Las Vegas, Nev, USA, July 2005.
  21. X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: a survey,” in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05), pp. 463–472, Tucson, Ariz, USA, December 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. A. P. Sabzevar and A. Stavrou, “Universal multi-factor authentication using graphical passwords,” in Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems (SITIS '08), pp. 625–632, Bali, Indonesia, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Gao, W. Jia, F. Ye, and L. Ma, “A survey on the use of graphical passwords in security,” Journal of Software, vol. 8, no. 7, pp. 1678–1698, 2013. View at Publisher · View at Google Scholar · View at Scopus