A Survey on Secure Authentication Systems

Abstract -- With the increasing popularity of smartphones, authentication plays a very important role. In any Industries contain records that are very sensitive and they want to protect from external world or hide from unauthorized user. So industry needs authentication system that can identify authorized user and that data accessible for only those users. So there are several authentication methods exist such as user name-password-based authentication, biometric authentication, smart card based authentications etc., this paper mainly presents on new authentication system using QR codes (Quick response code), which eliminate the weakness of password based authentication and bypass the risk generated from password authentication. This paper also presents various authentication systems and security comparison.

Keywords --

Authentication, Password, QR code, Smart Card,Unique Id,.

References --

[1]       L.Lamport, “Password authentication with insecure communication,” Commun. ACM, vol. 24, no. 11, pp. 770–772,  Nov. 1981.

[2]       Efficient QR code beautification with high quality visual content. Shih-Syun Lin, Min-Chun Hu, Member, IEEE, Chien-Han Lee, and Tong-Yee Lee, Senior Member, IEEE

[3]       A. C. Weaver and M. W. Condtry, “Distributing internet services to the network’s edge,” IEEE Trans. Ind. Electron.,  vol. 50, no. 3, pp. 404–411, Jun. 2003.

[4]       ThotaSriram, K.V.Rao, S Biswas, Basheer Ahmed, “Application of barcode technology in automated storage and retrieval systems”, BHEL.

[5]        T.-S.Wu and C.-L. Hsu,“Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks,” Computer Security, vol. 23, no. 2, pp. 120–125, 2004.

[6]       Y. Yang, S. Wang, F. Bao, J. Wang, and R. H. Deng, “New efficient user identification and key distribution scheme providing enhanced security,” Computer Security, vol. 23, no. 8, pp. 697–704, 2004.

[7]       Da Yang,YuShenglin, “Encoding and decoding of 2D code by Computer”[J].Data Acquisition and Processing, Vol.18 No.3,2003.

[8]       Shuhua Wang, Zuo Li, Shijie Cai, Detection for Skew of Document Image Based on Least Square Method. Computer Application and Software, 2001.

About the Author

Sumanth C M

Sumanth C M

Assistant Profrssor, RIT, Hassan

Assistant Profrssor, RIT, Hassan

Dis Estetigi Liposuction Tstanbul Liposuction istanbul Rhinoplasty Turkey rhinoplasty istanbul cosmetic surgery istanbul Bebek Kiyafetleri sac ekimi Burun Estetigi meme buyutme goz kapagi estetigi goz kapagi estetigi meme kucultme Lazer Lipoliz Karin Germe burun estetigi yuz germe burun estetigi meme estetigi Su Kabagi Gourd Lamps somine burun estetigi

Most Viewed - All Categories