Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Series

2017

Authentication

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Visual Authentication Based On Visual Cryptography Using Mobile Devices, Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi Jan 2017

Visual Authentication Based On Visual Cryptography Using Mobile Devices, Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi

Faculty of Engineering and Information Sciences - Papers: Part B

Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its wide-spread usage, password-based authentication has numerous deficiencies. For instance, password theft is becoming a common occurrence due to a variety of security problems associated with passwords.As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single session. Nevertheless, various one-time password schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we …