alexa Improving Service credibility in Password Authenticate
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Improving Service credibility in Password Authenticated Peer Services

To read the full article Peer-reviewed Article PDF image


Two server password-based authentication protocols (Two-Server PAKE), where two servers cooperate to authenticate a client on the basis of Password only and if one server is compromised due to Insider Attack or Denial Of Service Attack (DDOS), the attackercannot pretend to be the client with the information from the compromised server. Recent research advances in password-based authentication and follow two models. The first model, called PKI-based model, assumes that the client keeps the server’s public key in addition to share a password with the server. In this setting, the client can send the password to the server by public key encryption.The second model is called password-only model which follows encrypted key exchange (EKE) protocols, where the password is used as a secret key to encrypt random numbers for key exchange purpose.A password only authentication protocol which is both practical and provably-secure under cryptographic assumption.Our Protocol is Symmetric and, can run in parallel to establishes secret session keys between the client and two servers, respectively. In case one of the two servers shuts down due to the denial-of service attack, another server can continue to provide services to authenticated clients. In terms of parallel computation and reliable service, a symmetric protocol is superior to an asymmetric protocol.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version