Next Article in Journal
The Relationship between Postural Stability and Lower-Limb Muscle Activity Using an Entropy-Based Similarity Index
Next Article in Special Issue
Linear Algebraic Beamforming Design for Multiuser MISO Interference Channels: A Reduction in Search Space Dimension
Previous Article in Journal
Quantifying Configuration-Sampling Error in Langevin Simulations of Complex Molecular Systems
Previous Article in Special Issue
Software Defined Networks in Wireless Sensor Architectures
Open AccessArticle

Distributed One Time Password Infrastructure for Linux Environments

1
Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Universidad Complutense de Madrid (UCM), 28040 Madrid, Spain
2
Department of Convergence Security, Sungshin Women’s University, 249-1 Dongseon-Dong 3-ga, Seoul 136-742, Korea
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2018, 20(5), 319; https://doi.org/10.3390/e20050319
Received: 2 March 2018 / Revised: 14 April 2018 / Accepted: 23 April 2018 / Published: 26 April 2018
(This article belongs to the Special Issue Information Theory and 5G Technologies)
Nowadays, there is a lot of critical information and services hosted on computer systems. The proper access control to these resources is essential to avoid malicious actions that could cause huge losses to home and professional users. The access control systems have evolved from the first password based systems to the modern mechanisms using smart cards, certificates, tokens, biometric systems, etc. However, when designing a system, it is necessary to take into account their particular limitations, such as connectivity, infrastructure or budget. In addition, one of the main objectives must be to ensure the system usability, but this property is usually orthogonal to the security. Thus, the use of password is still common. In this paper, we expose a new password based access control system that aims to improve password security with the minimum impact in the system usability. View Full-Text
Keywords: distributed systems; authentication; OTP; PAM; PKI; cryptography; zero-knowledge proofs distributed systems; authentication; OTP; PAM; PKI; cryptography; zero-knowledge proofs
Show Figures

Figure 1

MDPI and ACS Style

Benito Peral, A.; Sandoval Orozco, A.L.; García Villalba, L.J.; Kim, T.-H. Distributed One Time Password Infrastructure for Linux Environments. Entropy 2018, 20, 319.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop