dc.contributor.author |
Zeyada, Hishameldeen Sharafeldeen Wd Easa |
|
dc.contributor.author |
Elmaleeh, Mohammed Abdelwahid Ahmed |
|
dc.contributor.author |
Hassan, Mohammed Osman Ahmed |
|
dc.contributor.author |
Mohammed, Rabiee Alfatih Rabiee |
|
dc.contributor.author |
Supervisor -, Rania Abdelhameed Mukhtar |
|
dc.date.accessioned |
2016-04-12T10:10:05Z |
|
dc.date.available |
2016-04-12T10:10:05Z |
|
dc.date.issued |
2015-09-10 |
|
dc.identifier.citation |
Zeyada , Hishameldeen Sharafeldeen Wd Easa . Implementation of Distributive Authentication System Using a Security Token / Hishameldeen Sharafeldeen Wd Easa Zeyada ... {etal } ; Rania Abdelhameed Mukhtar .- Khartoum: Sudan University of Science and Technology, College of Engineering, 2015 .- 76p. :ill. ;28cm .- Bachelors Search. |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/13201 |
|
dc.description |
Bachelors Search |
en_US |
dc.description.abstract |
Today, single factor authentication, e.g. passwords, is no longer considered
secure in the internet and banking world. Easy-to-guess passwords,
such as names and age, are easily discovered by automated passwordcollecting
programs, In addition ,it’s exhausted and slow, especially on a
multiple devices (distributed) environment.
Two factor authentications have recently been introduced to meet the demand
of organizations for providing stronger authentication options to its
users. Using two identification factors require often an additional device.
In this project, a security token will be used, the token will gain access for
multiple devices by writing a single password, the Bluetooth is the method
selected for connecting the token and devices.
The proposed method guarantees that authenticating to services, is done in a
very fast and a secure manner. In this model we develop a token software
for laptop; design a Bluetooth communication model between the token
(laptop) and devices that will be authenticated; complete the development
of this token distributed authentication prototype system finally.
The proposed method has been implemented and tested. Initial results show
the success of the proposed method. |
en_US |
dc.description.sponsorship |
Sudan University of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science and Technology |
en_US |
dc.subject |
Electronics Engineering |
en_US |
dc.subject |
Implementation of Distributive |
en_US |
dc.subject |
Authentication System |
en_US |
dc.subject |
Using a Security Token |
en_US |
dc.title |
Implementation of Distributive Authentication System Using a Security Token |
en_US |
dc.type |
Thesis |
en_US |