An Improved Security Approach For User authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret into two major classes: credential stealing and channel breaking attacks. Credentials such as users’ identifiers, passwords, and keys can be stolen by an attacker when they are inadequately administered. Even if all required information is firmly delivered to a user’s computer, the attacker inhabit on that user’s computer can effortlessly scrutinize and alter the information and show valid-looking yet not to be trusted information. Human user’s contribution in the security protocol is sometimes obligatory to foil this type of attacks but humans are not good at thorny calculations and do not have a plenty memory to remember cryptographically strong keys and signatures. Our approach to resolve the dilemma is to pioneer a transitional device that bridges a human user and a terminal.
Authors and Affiliations
B. Suresh, R. Sailaja
A Novel Soft Communicating Full Bridge Bidirectional Isolated Dc-Dc Converter for an Energy Storage System with Galvanic Isolation Using Electric Double Layer Capacitor
This paper shows the investigation of bidirectional DC to DC converter and contrasting and the different existing strategy methods. The proposed converter is planned in the way of shut circle control. By utilizing a...
Responsive Transmitting For Mobile Adhoc Network Routing Topology
Cooperative communication as became most important research topic for the people in wireless network. Most of the works focuses on the data link layer and physical layer where as ignorance of other layer and network...
A Systematic Approach For Testing And Debugging Networks Called Atpg
ATPG recognize router configurations and produces a device-independent model. The imitation is used to make a minimum set of test packets to simply put into effect every link in the network or maximally exercise ever...
Location Fixing by 3 DF Stations using Triangulation Method
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken fro...
Embedded Based Novel Track Methodology of Physiological Parameters Using Wi-Fi
In this work, a portable real-time wireless health monitoring system is developed. The system is used for remote monitoring of patients, temperature, heart rate, oxygen saturation in blood i.e. pulse oximetry and PH...