Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Title | Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | A., Jesudoss, M., Mercy Theresa |
Conference Name | 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) |
Date Published | Feb. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-8158-9 |
Keywords | authentication, CAPTCHA, captchas, cloud computing, composability, Computer crime, computer network security, cryptographic protocols, cryptography, denial of service, Hardware, hardware-independent Authentication Scheme, Human Behavior, Intelligent Authentication Scheme, Intelligent captcha technique, Internet, keylogger, message authentication, one time password, password, password-guessing attack, phishing attack, pubcrawl, replay attack, screenlogger, security attack, security attacks, Servers, Streaming bots, streaming bots attack |
Abstract | This paper provides hardware-independent authentication named as Intelligent Authentication Scheme, which rectifies the design weaknesses that may be exploited by various security attacks. The Intelligent Authentication Scheme protects against various types of security attacks such as password-guessing attack, replay attack, streaming bots attack (denial of service), keylogger, screenlogger and phishing attack. Besides reducing the overall cost, it also balances both security and usability. It is a unique authentication scheme. |
URL | https://ieeexplore.ieee.org/document/8869353 |
DOI | 10.1109/ICECCT.2019.8869353 |
Citation Key | a_hardware-independent_2019 |
- internet
- streaming bots attack
- Streaming bots
- Servers
- security attacks
- security attack
- screenlogger
- replay attack
- pubcrawl
- phishing attack
- password-guessing attack
- password
- one time password
- message authentication
- keylogger
- authentication
- Intelligent captcha technique
- Intelligent Authentication Scheme
- Human behavior
- hardware-independent Authentication Scheme
- Hardware
- denial of service
- Cryptography
- Cryptographic Protocols
- computer network security
- Computer crime
- composability
- Cloud Computing
- captchas
- CAPTCHA