Authentication Model Based on Reformation Mapping Method

The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the...

Full description

Saved in:
Bibliographic Details
Main Authors: Safdar, S., Hassan, M.F., Qureshi, M.A., Akhbar, R., Aamir, R.
Format: Conference or Workshop Item
Published: 2010
Subjects:
Online Access:http://eprints.utp.edu.my/3272/1/stamp.jsp%3Ftp%3D%26arnumber%3D5625708%26tag%3D1
http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5625708&queryText%3DMohd+Fadzil+Hassan%26openedRefinements%3D*%26searchField%3DSearch+All&tag=1
http://eprints.utp.edu.my/3272/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utp.eprints.3272
record_format eprints
spelling my.utp.eprints.32722017-01-19T08:24:15Z Authentication Model Based on Reformation Mapping Method Safdar, S. Hassan, M.F. Qureshi, M.A. Akhbar, R. Aamir, R. QA75 Electronic computers. Computer science QA76 Computer software The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the form other than its original form. Depending on the nature of the password i.e. linear or two dimensional, this reformation can be performed by rotation or shuffle techniques. Secondly, the reformation can be applied either to the user entered password or to the stored password at the time of authentication. This reformation ensures that the user entered password can be mapped appropriately with the stored password. The possible application of the proposed model is discussed using linear passwords and two dimensional nxn passwords. The proposed authentication model improves the security of the password by reforming its original form and hiding it from the hackers. 2010-06 Conference or Workshop Item PeerReviewed application/pdf http://eprints.utp.edu.my/3272/1/stamp.jsp%3Ftp%3D%26arnumber%3D5625708%26tag%3D1 http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5625708&queryText%3DMohd+Fadzil+Hassan%26openedRefinements%3D*%26searchField%3DSearch+All&tag=1 Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. and Aamir, R. (2010) Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies (ICIET 2010), 14-16 June 2010 , Karachi, Pakistan. http://eprints.utp.edu.my/3272/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
Aamir, R.
Authentication Model Based on Reformation Mapping Method
description The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the form other than its original form. Depending on the nature of the password i.e. linear or two dimensional, this reformation can be performed by rotation or shuffle techniques. Secondly, the reformation can be applied either to the user entered password or to the stored password at the time of authentication. This reformation ensures that the user entered password can be mapped appropriately with the stored password. The possible application of the proposed model is discussed using linear passwords and two dimensional nxn passwords. The proposed authentication model improves the security of the password by reforming its original form and hiding it from the hackers.
format Conference or Workshop Item
author Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
Aamir, R.
author_facet Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
Aamir, R.
author_sort Safdar, S.
title Authentication Model Based on Reformation Mapping Method
title_short Authentication Model Based on Reformation Mapping Method
title_full Authentication Model Based on Reformation Mapping Method
title_fullStr Authentication Model Based on Reformation Mapping Method
title_full_unstemmed Authentication Model Based on Reformation Mapping Method
title_sort authentication model based on reformation mapping method
publishDate 2010
url http://eprints.utp.edu.my/3272/1/stamp.jsp%3Ftp%3D%26arnumber%3D5625708%26tag%3D1
http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5625708&queryText%3DMohd+Fadzil+Hassan%26openedRefinements%3D*%26searchField%3DSearch+All&tag=1
http://eprints.utp.edu.my/3272/
_version_ 1738655257711345664
score 13.149126