Magpie: supporting browsing and navigation on the semantic web
Proceedings of the 9th international conference on Intelligent user interfaces
Design progress management for security requirements in ubiquitous computing using COQUALMO
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Hi-index | 0.00 |
When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. This research relates to a user identification by an indirect password, which allows for a password control system to identify user by a received value, which is calculated with a predetermined function known to both user and password control system, and a value of a variable, which is provided form a password control system. According to the research, password cannot be embezzled in the input stage and hacking by intercept on the transmission line is to be in vain.