DocumentCode :
2689898
Title :
Two level efficient user authentication scheme
Author :
Bardis, Nikolaos G. ; Doukas, Nikolaos ; Markovskyi, Oleksandr P. ; Drigas, Athanasios
Author_Institution :
Dept of Math. & Eng. Sci., Hellenic Army Acad., Vari, Greece
fYear :
2010
fDate :
13-16 April 2010
Firstpage :
470
Lastpage :
474
Abstract :
User authentication procedures are a computer system´s first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations may prevent system designers from implementing efficient authentication procedures. This paper presents a robust two level authentication procedure is presented that is highly efficient and suitable for multi-user systems. Authentication is attained in only a single cycle of exchanges between the user and the authentication system. Further advantages arise from the fact that with the proposed technique, it is not necessary to store lists of passwords and therefore the overhead caused in systems with large numbers of registered users is minimal. The proposed architecture is shown to be reliable while creating significant economies in the amount of information that needs to be stored. These facts therefore render the architecture highly suitable for hardware implementations.
Keywords :
authorisation; computer system; malicious attacks; multiuser system; password; system availability; system reliability; user authentication; Authentication; Computer architecture; Computers; Conferences; Cryptography; Protocols; Authentication; Multi user systems; Secure non - volatile memory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital Ecosystems and Technologies (DEST), 2010 4th IEEE International Conference on
Conference_Location :
Dubai
ISSN :
2150-4938
Print_ISBN :
978-1-4244-5551-5
Type :
conf
DOI :
10.1109/DEST.2010.5610605
Filename :
5610605
Link To Document :
بازگشت