1 |
Token-based Graphical Password AuthenticationGyorffy, John Unknown Date
No description available.
|
2 |
Token-based Graphical Password AuthenticationGyorffy, John 11 1900 (has links)
Given that phishing is an ever increasing problem, a better authentication system than the
current alphanumeric system is needed. Because of the large number of current
authentication systems that use alphanumeric passwords, a new solution should be
compatible with these systems. We propose a system that uses a graphical password
deployed from a Trojan and virus resistant embedded device as a possible solution. The
graphical password would require the user to choose a family photo sized to 441x331
pixels. Using this image, a novel, image hash provides an input into a cryptosystem on
the embedded device that subsequently returns an encryption key or text password. The
graphical password requires the user to click five to eight points on the image. From
these click-points, the embedded device stretches the graphical password input to a 32-
character, random, unique alphanumeric password or a 256-bit AES key. Each
embedded device and image are unique components in the graphical password system.
Additionally, one graphical password can generate many 32-character unique,
alphanumeric passwords using its embedded device which eliminates the need for the
user to memorize many passwords. / Computer Engineering
|
3 |
Webová aplikace využívající vícefaktorovou autentizaci / Web application utilizing multi-factor authenticationHumpolík, Jan January 2013 (has links)
In the thesis are described and implemented 5 methods (some with their own proposal) of multifactor authentication in web application environment. The results of the work is the web application and individual authentication methods (which are attached separately) for use in your own web application.
|
4 |
Laboratorní úloha infrastruktury veřejných klíčů / Lab of public key infrastructureSlavík, Petr January 2009 (has links)
The aim of this thesis is to study and describe the theme of Public Key Infrastructure (PKI). Within the scope of minute PKI characterization there is a gradual depiction of particular structural elements, which are above all represented by cryptographic operations (asymetric and symetric cryptography, hash function and digital signature); then, there are also individual PKI subjects that are dealt with, like eg. certification authority, certificates, security protocols, secure heap etc. Last but not least there are a few complete Public Key Infrastructure implementation solutions described (OpenSSL, Microsft CA). The practical part of the thesis, a lab exercise, gives potential students the knowledge of installing OpenSSL system based certification authority. The next task educate students how to secure web server with certificate signed with own CA and also how to secure web server users‘ access control through certificates signed by the previously installed CA.
|
Page generated in 0.0369 seconds