Authentication Model Based on Reformation Mapping Method
The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the...
Saved in:
Main Authors: | Safdar, S., Hassan, M.F., Qureshi, M.A., Akhbar, R., Aamir, R. |
---|---|
Format: | Conference or Workshop Item |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utp.edu.my/3272/1/stamp.jsp%3Ftp%3D%26arnumber%3D5625708%26tag%3D1 http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5625708&queryText%3DMohd+Fadzil+Hassan%26openedRefinements%3D*%26searchField%3DSearch+All&tag=1 http://eprints.utp.edu.my/3272/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
by: Safdar, S., et al.
Published: (2011) -
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010) -
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010) -
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010) -
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)