Anti-Phishing Design Using Mutual Authentication Approach
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft. The e-mail endorse the client to visit a mimic Web site where they are request to update individual information, such as credit card number, bank account numbers, date of birth, confidential passwords etc., the above process is known as Phishing. We recommend an approach, “anti-Phishing Design using Mutual Authentication Approach” With mutual authentication, a connection can occur only when the client trusts the server and the server trusts the client. The exchange of data is carried out by means of the Security protocol. For the anti-Phishing system we are proposed mutual authentication protocol & hash generating function RIPEMD-160 along with one time password. Our process can efficiently reduce the risk of phishing in very simple steps to naive computer user
Authors and Affiliations
Mitesh Bargadiya , Vijay Chaudhari , Mohd. Ilyas khan , Bhupendra Verma
Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases
The work of this paper presents the new idea of using Walsh transform to generate the feature vector for content based image retrieval. The complex Walsh transform is conceived by multiplying Sal functions...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...
NETWORK STORAGE AND ITS FUTURE
In the IT world storage becomes a serious issue. Information storage systems are the bedrock on which a modern company rests. Data has to be available to whoever needs it, whenever they need it, from...
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
Unsupervised Analysis of Arrhythmias using K-means Clustering
The Electrocardiogram provides the valuable information regarding the cardiovascular diseases. Various methods for classification of arrhythmias have been developed by researchers. Classification can be supervised or uns...