| dc.contributor.author | Zeyada, Hishameldeen Sharafeldeen Wd Easa | |
| dc.contributor.author | Elmaleeh, Mohammed Abdelwahid Ahmed | |
| dc.contributor.author | Hassan, Mohammed Osman Ahmed | |
| dc.contributor.author | Mohammed, Rabiee Alfatih Rabiee | |
| dc.contributor.author | Supervisor -, Rania Abdelhameed Mukhtar | |
| dc.date.accessioned | 2016-04-12T10:10:05Z | |
| dc.date.available | 2016-04-12T10:10:05Z | |
| dc.date.issued | 2015-09-10 | |
| dc.identifier.citation | Zeyada , Hishameldeen Sharafeldeen Wd Easa . Implementation of Distributive Authentication System Using a Security Token / Hishameldeen Sharafeldeen Wd Easa Zeyada ... {etal } ; Rania Abdelhameed Mukhtar .- Khartoum: Sudan University of Science and Technology, College of Engineering, 2015 .- 76p. :ill. ;28cm .- Bachelors Search. | en_US |
| dc.identifier.uri | http://repository.sustech.edu/handle/123456789/13201 | |
| dc.description | Bachelors Search | en_US |
| dc.description.abstract | Today, single factor authentication, e.g. passwords, is no longer considered secure in the internet and banking world. Easy-to-guess passwords, such as names and age, are easily discovered by automated passwordcollecting programs, In addition ,it’s exhausted and slow, especially on a multiple devices (distributed) environment. Two factor authentications have recently been introduced to meet the demand of organizations for providing stronger authentication options to its users. Using two identification factors require often an additional device. In this project, a security token will be used, the token will gain access for multiple devices by writing a single password, the Bluetooth is the method selected for connecting the token and devices. The proposed method guarantees that authenticating to services, is done in a very fast and a secure manner. In this model we develop a token software for laptop; design a Bluetooth communication model between the token (laptop) and devices that will be authenticated; complete the development of this token distributed authentication prototype system finally. The proposed method has been implemented and tested. Initial results show the success of the proposed method. | en_US |
| dc.description.sponsorship | Sudan University of Science and Technology | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Sudan University of Science and Technology | en_US |
| dc.subject | Electronics Engineering | en_US |
| dc.subject | Implementation of Distributive | en_US |
| dc.subject | Authentication System | en_US |
| dc.subject | Using a Security Token | en_US |
| dc.title | Implementation of Distributive Authentication System Using a Security Token | en_US |
| dc.type | Thesis | en_US |