Posts: 2
Threads: 2
Joined: Feb 2010
can you please send ppt representation and report of the topic mentioned above
Posts: 1,061
Threads: 613
Joined: Feb 2010
abstract:
Password-based authentication is susceptible to attack is used on insecure communication channels like the Internet. Researchers have engineered several protocols to prevent attacks, but we still nee formal models to analyze and aid in the effective design of acceptable password protocols geared to prevent dictionary attacks. The most common verification technique is to check whether the claimant possesses information or characteristics that a genuine entity should possess. For example, we can authenticate a phone call by recognizing a personâ„¢s voice and identify people we know by recognizing their appearance. But the authentication process can get complicated when visual or auditory clues arenâ„¢t available to help with identificationâ€for example, when a print spooler tries to authenticate a printer over the network, or a computer tries to authenticate a human user logging in. A computer can authenticate humans through ¢ biometric devices such as retinal scanners, fingerprint analyzers, and voice-recognition systems that authenticate who the user is; ¢ passwords that authenticate what the user knows; ¢ and smart cards and physical keys that authenticate what the user has.
please read
http://cs.uky.edu/~singhal/SINGHAL.pdf
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf