[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3549206.3549304acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

Security Analysis of User Authentication and Methods

Published: 24 October 2022 Publication History

Abstract

Recent studies on authentication protocols and login systems have drawn much attention due to their importance and purpose. All around the world, there are types of usage of the internet, devices, personal or corporate computers, web servers, etc. which summarizes that technology is a part of daily life and routine. Similarly, login and authentication are important aspects of every system software. These systems and software tend to keep logs, databases, files, algorithms, secrets, etc. which are related to either one user or an entire company or group of people. To protect these details of importance so they can be kept away from being stolen and modified, authentications and login are required so that it is only accessible to read/write who is the owner or who is authorized to do so. The application widely concentrates on the types of authentications around the World Wide Web and with the help of the scripting language PHP. PHP plays a vital role in this project due to its name and importance in the wide global market of Development and debugging. Nowadays every website around the globe uses a process to identify the logged-in user data and its accessibility. Our project purely focuses on some of these methods.

References

[1]
H. Z. U. Khan, "Comparative Study of authentication Techniques," 2010.
[2]
N. Hossain, M. A. Hossain, M. Hossain, M. Shag and S. Rahman, "OAuth-SSO: A Framework to Secure the OAuth-based SSO Service for Packaged Web Applications,"10.1109/TrustCom/BigDataSE. 2018.00227, New York, 2018.
[3]
T. M. Luper, C. D. Nyap and A. I, "An Enhanced Password-Username Authentication System Using Cryptographic Hashing and Recognition Based Graphical Password," IOSR Journal of Computer Engineering, 2016.
[4]
A. Amin, I. u. Haq and M. Nazir, "Two Factor Authentication," International Journal of Computer Science and Mobile Computing, 2017.
[5]
A. Nath and T. Mondal, "Issues and Challenges in Two Factor Authentication Algorithms," International Journal of Latest Trends in Engineering and Technology, 2016.
[6]
B. K. Kushwala, "An Approach for use authentication one-time password (numeric and graphic) scheme," Journal of global research in computer science, 2012.
[7]
K. Adhatrao, A. Gaykar, R. Jha and V. Honrao, "A secure method for signing in using response codes with mobile authentication," International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11, 2013.
[8]
T. Grob, "Security Analysis of the SAML Single Sign-on Browser/Artifact Profile," 19th Annual Computer Security Applications Conference, 2003.
[9]
C. Jones, "The most Significant Password Breaches of 2021," 9 Fabruary 2022. [Online]. Available: https://expertinsights.com /insights/the-most-significant-password-breaches
[10]
A. Singh, "Payatu," 31 March 2022. [Online]. Available: https://payatu.com/blog/anubhav.singh/oauth-vulnerabilities.

Cited By

View all
  • (2024)Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based imagesEURASIP Journal on Information Security10.1186/s13635-024-00175-22024:1Online publication date: 15-Aug-2024
  • (2023)CNN-based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks using Entropy-Informed RF-DNA FingerprintsMILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM58377.2023.10356313(377-384)Online publication date: 30-Oct-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing
August 2022
710 pages
ISBN:9781450396752
DOI:10.1145/3549206
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Authentication
  2. Two- factor authentication
  3. social login
  4. user security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IC3-2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based imagesEURASIP Journal on Information Security10.1186/s13635-024-00175-22024:1Online publication date: 15-Aug-2024
  • (2023)CNN-based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks using Entropy-Informed RF-DNA FingerprintsMILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM58377.2023.10356313(377-384)Online publication date: 30-Oct-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media