Information Management & Computer Security: Volume 18 Issue 2

Subjects:

Table of contents

A personalized rhythm click‐based authentication system

Ting‐Yi Chang, Yu‐Ju Yang, Chun‐Cheng Peng

In keystroke‐based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics…

1824

Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password system

Seung S. Yang, Hongsik Choi

One‐time password systems provide great strengths over conventional password systems: protection against over‐the‐shoulder, eavesdropping, replay, etc. The Grid Data Security…

Security guideline tool for home users based on international standards

Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara

The level of security of home information systems can be described as their capacity to resist all the accidental or deliberate malicious activities based on the evaluation…

1170

Assessing and improving authentication confidence management

Michael Pearce, Sherali Zeadally, Ray Hunt

The purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents…

1173
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid