oalogo2  

AUTHOR(S): 

Bruno Carpentieri

 

TITLE

Implementing a Secure Authentication System

pdf PDF

ABSTRACT

One of the most used techniques for ensuring the safety of a system is authentication. The login/password mechanism that is widely used for authentication on PC or on general purpose computer systems it is not always adequate to ensure security in the authentication phase. In this paper we show the implementation of a secure authentication system based on One Time Passwords and Face Recognition. The system has been implemented in C language on a Unix like environment and it is currently used and tested in our data compression lab in Salerno.

KEYWORDS

Security, Operating Systems, Unix, One Time Passwords, Face Recognition

REFERENCES

[1] C. Herley, P. C. Oorschot, and A. Patrick, Passwords: If We're So Smart, Why Are We Still Using Them? International Conference on Financial Cryptography and Data Security, pp 230-237, Springer, Berlin, Germany, 2009.

[2] A. De-Angeli, M. Coutts, L. Coventry, G. Johnson, D. Cameron, and M.-H. Fischer, “VIP: a visual approach to user authentication,” in Proceedings of the Working Conference on Advanced Visual Interfaces, pp. 316–323, Trento, Italy, 2002.

[3] L. Y. Por, Mitigation of Shoulder-Surfing Attack on Picture-Based Passwords Using Falsifying Authentication Methods, Faculty of Computer Science and Information Technology, University of Malaya, 2012.

[4] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “PassPoints: design and longitudinal evaluation of a graphical password system,” International Journal of Human Computer Studies, vol. 63, no. 1-2, pp. 102–127, 2005.

[5] Sang Guun Yoo, “E- SAS: Enhanced Secure Authentication System for Healthcare Applications using Wireless Medical Sensor Networks”, WSEAS Transactions on Systems, pp. 309-320, Volume 15, 2016.

[6] Paul Viola and Michael Jones, Rapid Object Detection using a Boosted Cascade of Simple Features, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001. CVPR 2001.

[7] Rainer Lienhart and Jochen Maydt, An extended set of Haar-like features for rapid object detection, Proceedings of the International Conference on Image Processing. 2002. ICIP 2002.

Cite this paper

Bruno Carpentieri. (2017) Implementing a Secure Authentication System. International Journal of Computers, 2, 47-52

 

cc.png
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0