Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems.
Aurel-Dragos HofnarMarius JoldosPublished in: ICCP (2019)
Keyphrases
- user authentication
- legacy systems
- authentication scheme
- authentication protocol
- authentication mechanism
- security mechanisms
- identity management
- integrity verification
- security analysis
- factor authentication
- password authentication
- data encryption
- security requirements
- key distribution
- smart card
- rights management
- access control
- database
- security issues
- business rules
- reverse engineering
- information security
- knowledge base
- information systems