无密码认证的综合研究

Viral Parmar, Harshal A. Sanghvi, Riki H. Patel, A. Pandya
{"title":"无密码认证的综合研究","authors":"Viral Parmar, Harshal A. Sanghvi, Riki H. Patel, A. Pandya","doi":"10.1109/ICSCDS53736.2022.9760934","DOIUrl":null,"url":null,"abstract":"In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Comprehensive Study on Passwordless Authentication\",\"authors\":\"Viral Parmar, Harshal A. Sanghvi, Riki H. Patel, A. Pandya\",\"doi\":\"10.1109/ICSCDS53736.2022.9760934\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.\",\"PeriodicalId\":433549,\"journal\":{\"name\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCDS53736.2022.9760934\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCDS53736.2022.9760934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

在技术发达的今天,基于用户的认证和密码已广泛应用于所有信息系统和服务中。大多数大学也对许多服务使用这种类型的身份验证方法,但密码存在危险。通过提供一个密码保护的验证系统,为最可用和最安全的组织。在过去,密码被用作防止未经授权访问的最佳认证系统。现在,认证系统的技术日益发展,因此修改密码会更加安全。然而,这种传统系统的脆弱性促使业界和研究人员寻找一种新的替代方案,这种替代方案没有盗窃、黑客攻击和密码破解等威胁。本研究更详细地讨论了验证密码真实性的关键策略,并试图解释每种技术的细节和过程。本文对过去几年进行的研究进行了广泛的回顾,并对最近的研究工作进行了回顾,这些研究工作主要是为了提高端到端加密过程的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Comprehensive Study on Passwordless Authentication
In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信