Replacing passwords with "passcodes"

In this paper, we try to introduce a pass code authentication where we facilitate users with password free authentication. This method can be treated as Load free or burden free for users as there is no need for the users to remember their passwords. | ISSN:2249-5789 Prabhakar Gantela et al, International Journal of Computer Science & Communication Networks,Vol 6(2),94-97 Replacing Passwords with "Passcodes" Prabhakar Gantela Assistant Professor, Department of Information Technology Mizan-Tepi University, Tepi Campus, Ethiopia Email:gantelaprabhakar@ Abstract Authentication now-a-day is common for every activity done over Internet and also offline operations. Login system generally followed over the years is just a combination of username and password. These two can be treated as joint words which cannot be separated from one another. Password has been the security aspect that has been helping us in many ways and in many forms. Password has changed its shape from text to voice, iris, biometric, image, face, video and now-a-days device authentication. Whatever the encryption and decryption we follow there has been always a chance for the data to be stolen because as the researchers try to find new solutions for security so as the hackers try to find new ways for stealing the data. It's a never ending process. In this paper, we try to introduce a pass code authentication where we facilitate users with password free authentication. This method can be treated as Load free or burden free for users as there is no need for the users to remember their passwords. We conclude this paper with an option of implementing a password free world where the user may be left only with a user name but no password. Keywords Authentication, Passwords, Security, Pass code, Arithmetic calculations, operators, brute force attacks. IJCSCN | April-May 2016 Available online@ Dr. R. Mahammad Shafi Associate Professor, Department of Electrical & Computer Engineering, Mizan-Tepi University, Tepi Campus, Ethiopia Email:rmdshafi@ 1. Introduction Over last five decades, authentication has been in our daily life activity. There is a rapid growth in using logins since ten years as the technology has been a part

Bấm vào đây để xem trước nội dung
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.