Notice of Violation of IEEE Publication Principles: Immune Selection Algorithm-Based User Authentication System

This work explores a new concept in user authentication to improve security on login process. Most authentication systems use some form Positive Identification (PI) to identify legitimate users. Specifically, these systems use a password profile containing all the user passwords that are authorized...

Full description

Saved in:
Bibliographic Details
Published in2009 Fourth International Conference on Frontier of Computer Science and Technology pp. 377 - 381
Main Authors Tang, Jun, Zhao, Xiaojuan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2009
Online AccessGet full text
ISBN0769539327
1424454662
9780769539324
9781424454662
ISSN2159-6301
DOI10.1109/FCST.2009.15

Cover

More Information
Summary:This work explores a new concept in user authentication to improve security on login process. Most authentication systems use some form Positive Identification (PI) to identify legitimate users. Specifically, these systems use a password profile containing all the user passwords that are authorized to access the system (or the server). Notice of Violation of IEEE Publication Principles "Immune Selection Algorithm-based User Authentication System" by Jun Tang and Xiaojuan Zhao in the Proceedings of the International Conference on Frontier of Computer Science and Technology, December 2009, pp. 377-381 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper is a near verbatim copy of the paper cited below. The original text was copied with no attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "An Investigation of Negative Authentication Systems" by Dipankar Dasgupta and Rukhsana Azeem in the Proceedings of thev3rd International Conference on Information Warfare and Security, April 2008
ISBN:0769539327
1424454662
9780769539324
9781424454662
ISSN:2159-6301
DOI:10.1109/FCST.2009.15