Design and implementation of Negative Authentication System
Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring secu...
Main Authors: | Dasgupta, Dipankar (Author), Ferebee, Denise (Author), Roy, Arunava (Author), Madero, Alvaro (Contributor), Sanchez, Abel (Contributor), Nag, Abhijit Kumar (Author), Saha, Sanjib Kumar (Author), Subedi, Kul Prasad (Author), Williams, John R (Contributor) |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Civil and Environmental Engineering (Contributor), Massachusetts Institute of Technology. Institute for Data, Systems, and Society (Contributor) |
Format: | Article |
Language: | English |
Published: |
Springer Berlin Heidelberg,
2019-03-15T19:52:30Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Password secured systems and negative authentication
by: Madero, Alvaro
Published: (2014) -
A Survey on Computational Intelligence Techniques in User Identity Management
by: Abhijit Kumar Nag
Published: (2019-08-01) -
The Predictive Power of Authenticity on Emotional Well-being (Positive-Negative Affect): Authenticity and Positive-Negative Affect among Turkish and English University Students
by: Behire KUYUMCU, et al.
Published: (2018-05-01) -
The design and implementation of Authentication Environment
by: Chung-hsi Hung, et al.
Published: (1999) -
Antibiotic Resistance in Environmental Microbes: Implementing Authentic Research in the Microbiology Classroom
by: Mangala Tawde, et al.
Published: (2020-10-01)