PASSWORD SECURITY VIA NEURAL NETWORKS

محتوى المقالة الرئيسي

Mokhtar Mohammed Hasan

الملخص

Password security and protection are one of the important research topics in modem computer systems. Providing privacy, authenticity, integrity and limited access to data, encryption methods are proposed for password security schemes.This paper proposes the use of neural network accessing the system, the system needs other information extracted from the user's password along with the password itself, these information is passed to two different neural networks to examine the authenticity of the user, and then decide whether the user is a legal user or an intruder.The extracted information can be summarized by the time period between each two successive characters in the password and the strength of strike of the user when each character is typed at login time. As a result is a powerful security scheme for password protection and the user has no wary about password being theft because the related password information can not be theft.

تفاصيل المقالة

القسم

Articles

كيفية الاقتباس

"PASSWORD SECURITY VIA NEURAL NETWORKS" (2008) مجلة الهندسة, 14(01), ص 2184–2200. doi:10.31026/j.eng.2008.01.11.

المراجع

-Werner Kinnebrock, “Neural Networks, Fundamentals, Applications, Examples”, Technical University Rheinland-Pfalz, 2nd Revised Edition, 1995

- Kung S. Y., “Digital Neural Network”, New Jersey, 1993

- Simon Haykin, “Neural Networks, A comprehensive Foundation”, McMaster University, Hamilton, Ontario, Canada, 1994

- Richard P. Lippman, "An Introduction to Computing with Neural Nets", IEEE ASSP magazine, 1987

- Jacek M. Zurada, “Introduction to Artificial Neural Systems”, 1996

- John R. Smith, “Feature Extraction for Neural Network”, March 6, 1996, Internet Paper

- Wolfgang Banzhaf, Riccardo Poli, Marc Schoenauer and Terence C. Fogarty, "Lecture Notes in Computer Security", First European Workshop, Euro 99, Paris, France, April 1998.

- Henk C. A. Van Tilborg, "An Introduction to Cryptology", Kluwer Academic Publishers, 1988

- B. Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code", Second Edition, John Wiley & Sons Inc, 1997.

- Alan G. Konheim, "Cryptography: A Primer", John & Wily, 1992

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.

الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين