Work place: Jamia Millia Islamia/Department of Computer Science, Delhi, 110025, India
Research Interests: Applied computer science, Computer systems and computational processes, Information Security, Information Systems, Theoretical Computer Science, Information-Theoretic Security
Prof Khurram Mustafa (b.1964), graduated first with a masters’ degree in ‘Mathematics with Computer Science’ from Jamia Millia Islamia, New Delhi; followed by MTech & PhD, from IIT Delhi, India. Though, he did his PhD on an interdisciplinary topic related to eLearning, he continues to supervise/write/speak on diverse fields pertaining to eLearning, information security and Research Methods in Computer Science. He is currently working as a Professor of Computer Science. During his prolonged career of over two decades, he has the distinction of being the founder Head of the department in year 2000 and establishing the same during his 3 tenures as HoD. 5 years’ tenure, as a professor and an Associate professor. He has supervised more than a dozen PhD students towards completion, coauthored 2 books (published by Narosa, India and the international edition by Alpha Science, UK), out of those one has been translated to Chinese language. Apart from these on the academic contributions upfront, he has co-authored several book chapters and over 100 research papers, published in international journals and conference proceedings. He also led a 3-years government funded project as PI - in the field of information security and delivered more than 50 invited-talks, including keynote-addresses. In addition, he is on several statuary committees, editorial review boards; and a member of several professional scientific societies in including ISTE, ICST, EAI, ACM-CSTA, eLearning Guild & InfoPier.
DOI: https://doi.org/10.5815/ijcnis.2019.01.05, Pub. Date: 8 Jan. 2019
There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of password based authentication is addressed, by introducing and analyzing different schemes of authentication, respective advantages and disadvantages, and probable causes of the ‘very disconnect’ between user and password mechanisms. The evolution of passwords and how they have deep-rooted in our life is remarkable. This paper addresses the gap between the user and industry perspectives of password authentication, the state of art of password authentication and how the most investigated topic in password authentication changed over time. The author’s tries to distinguish password based authentication into two levels ‘User Centric Design Level’ and the ‘Machine Centric Protocol Level’ under one framework. The paper concludes with the special section covering the ways in which password based authentication system can be strengthened on the issues which are currently holding-in the password based authentication.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals