The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The fields of security and usability often conflict with each other. Security focuses on making systems difficult for attackers to compromise. However, doing this also increases difficulty for the user. Users in security are often seen as an obstacle - they are the weakest point of the system, willing to circumvent security policies in order to access their work faster. A large part of security is...
Currently, most authentication system requires users to answer the CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Human Apart) before gaining the system access. CAPTCHA is a standard security technology for distinguish between human and computer program automatically. The problem of using CAPTCHA is the difficulty of reading the text-based presentation, or interpreting the image-based...
Web based learning or e-learning is growing day by day. But the evaluation system is always questioned by the authority if it is conducted remotely. The questions mainly arise about the authenticity of the examinee and fairness during the examination. In this paper a biometric authentication and tracking system has been proposed. Here iris recognition is used as biometric authentication tool. The...
In order to better ensure the Web security, we designed a CAPTCHA mechanism. It took the RIA areas flexibility combined with interaction design field and used to CAPTCHA design field. This kind of mechanism improves the safety of the CAPTCHA from four aspects. First, we used interactions of man - machines; Second, by comparing the server-side SessionID, random ID and flag variable, it prevents malicious...
A CAPTCHA is a technique that is used to prevent automated programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHAs could be overcome by state-of-the-art malwares since the capabilities of computers are approaching those of humans. Therefore, CAPTCHAs should be based on even more advanced human-cognitive-processing...
Authentication in the document context refers to the ability to trace the origins of a document to a given person or device used to produce it or to a given time or place it was produced. The general approach typically involves comparing physical, visual and/or linguistic properties of a questioned source to reproducible properties of a known or genuine source. The challenges lie in defining acceptable...
CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHA could be overcome by state-of-the-art malware since the capabilities of computers are approaching those of humans. Therefore, CAPTCHA should be based on even more advanced human-cognitive-processing...
Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are vulnerable to spyware attacks. We propose a new scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart) that retaining the advantages of graphical password schemes, while simultaneously...
CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHA could be overcome by state-of-the-art malware since the capabilities of computers are approaching those of humans. Therefore, CAPTCHA should be based on even more advanced human-cognitive-processing...
CAPTCHAs are challenges or tests administered automatically over networks that can distinguish between people and machines (automated script) and thus protect web services from abuse by programs disguising as human users. Most existing CAPTCHA challenges are a single challenge response system (CR) that provide ready-made answers to the users in which case a bot may answer the test and escape scot-free...
In these days, password security is one of major part of security problems. With reference to the memory ability of human's memory and the previous solution proposed over the text password, we can find graphical password as one of the best solution in this way. On the other hand, parallel by graphical password, query direct password (QDP) is one of the major studies in password security. As, Kerberos...
Graphical passwords are an alternative authentication method to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. This research aims to study the usability features of the recognition base graphical password methods available and extract the usability features of the existing methods. In this paper we study the recognition base...
The unprecedented increase of potential threats to computer systems serves as a premise to the prioritisation of security within end-user systems and applications. Organisations and institutions design different ways of providing security to their systems. Antivirus software and passwords are the common tools used to achieve security. However, the traditional use of passwords for information security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.