Mustafa Nouman Murad Al-Hassan | Middle East Graduate University (original) (raw)
Related Authors
Universidade Federal de Santa Catarina - UFSC (Federal University of Santa Catarina)
Uploads
Papers by Mustafa Nouman Murad Al-Hassan
This paper presents a multifactor authentication scheme using the keystroke dynamics. The scheme ... more This paper presents a multifactor authentication scheme using the keystroke dynamics. The scheme is composed of two keystroke patterns levels. In this first level, the speed of each user's password is measured depending on the comparisons between the registered speeds with different calculated thresholds. In the case of large deviations in the typing speeds, the user must transit to the second authentication level. In this level, the user decrypts ciphered thresholds by using his/her private key. The objective of this paper is to provide a strong authentication method and to assign a high accepted value of the typing speed by training the user to type his/her password 100 times as a pretest before the actual registration level . In this case , the system results in a high precise speed values . The system is analyzed using different statistical measurements.
This paper presents a new partially blind signature, dedicated for sensitive applications, and de... more This paper presents a new partially blind signature, dedicated for sensitive applications, and depending on agreement factors. In the traditional partially blind signature schemes, there is an agreement between the sender and the signer, but in this method, the agreement is used to recover blind messages by an individual group of users and to enforce the system's security.The blind signature used in this method is based on RSA scheme designed by Chaum [1] as an initial step to our system with modifications. The proposed method enhances the important properties of blind signature schemes such as unforgeability, the anonymity, blindness and others. The security of this developed system is analyzed to show the importance of agreement in blind signatures. The most important property of this scheme is to classify messages according to their sensitivity that can be used to recover unblined message by authentication group selected by the singer and to use agreement secure information to get more secure system.
This paper presents a new partially blind signature, dedicated for sensitive applications, and de... more This paper presents a new partially blind signature, dedicated for sensitive applications, and depending on agreement factors. In the traditional partially blind signature schemes, there is an agreement between the sender and the signer, but in this method, the agreement is used to recover blind messages by an individual group of users and to enforce the system’s security .The blind signature used in this method is based on RSA scheme designed by Chaum as an initial step to our system with modifications. The proposed method enhances the important properties of blind signature schemes such as unforgeability, the anonymity, blindness and others. The security of this developed system is analyzed to show the importance of agreement in blind signatures. The most important property of this scheme is to classify messages according to their sensitivity that can be used to recover unblined message by authentication group selected by the singer and to use agreement secure information to get more secure system.
This paper presents a multifactor authentication scheme using the keystroke dynamics. The scheme ... more This paper presents a multifactor authentication scheme using the keystroke dynamics. The scheme is composed of two keystroke patterns levels. In this first level, the speed of each user's password is measured depending on the comparisons between the registered speeds with different calculated thresholds. In the case of large deviations in the typing speeds, the user must transit to the second authentication level. In this level, the user decrypts ciphered thresholds by using his/her private key. The objective of this paper is to provide a strong authentication method and to assign a high accepted value of the typing speed by training the user to type his/her password 100 times as a pretest before the actual registration level . In this case , the system results in a high precise speed values . The system is analyzed using different statistical measurements.
This paper presents a new partially blind signature, dedicated for sensitive applications, and de... more This paper presents a new partially blind signature, dedicated for sensitive applications, and depending on agreement factors. In the traditional partially blind signature schemes, there is an agreement between the sender and the signer, but in this method, the agreement is used to recover blind messages by an individual group of users and to enforce the system's security.The blind signature used in this method is based on RSA scheme designed by Chaum [1] as an initial step to our system with modifications. The proposed method enhances the important properties of blind signature schemes such as unforgeability, the anonymity, blindness and others. The security of this developed system is analyzed to show the importance of agreement in blind signatures. The most important property of this scheme is to classify messages according to their sensitivity that can be used to recover unblined message by authentication group selected by the singer and to use agreement secure information to get more secure system.
This paper presents a new partially blind signature, dedicated for sensitive applications, and de... more This paper presents a new partially blind signature, dedicated for sensitive applications, and depending on agreement factors. In the traditional partially blind signature schemes, there is an agreement between the sender and the signer, but in this method, the agreement is used to recover blind messages by an individual group of users and to enforce the system’s security .The blind signature used in this method is based on RSA scheme designed by Chaum as an initial step to our system with modifications. The proposed method enhances the important properties of blind signature schemes such as unforgeability, the anonymity, blindness and others. The security of this developed system is analyzed to show the importance of agreement in blind signatures. The most important property of this scheme is to classify messages according to their sensitivity that can be used to recover unblined message by authentication group selected by the singer and to use agreement secure information to get more secure system.