Anti-Phishing Design Using Mutual Authentication Approach
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft. The e-mail endorse the client to visit a mimic Web site where they are request to update individual information, such as credit card number, bank account numbers, date of birth, confidential passwords etc., the above process is known as Phishing. We recommend an approach, “anti-Phishing Design using Mutual Authentication Approach” With mutual authentication, a connection can occur only when the client trusts the server and the server trusts the client. The exchange of data is carried out by means of the Security protocol. For the anti-Phishing system we are proposed mutual authentication protocol & hash generating function RIPEMD-160 along with one time password. Our process can efficiently reduce the risk of phishing in very simple steps to naive computer user
Authors and Affiliations
Mitesh Bargadiya , Vijay Chaudhari , Mohd. Ilyas khan , Bhupendra Verma
Fault-Tolerance and Permutation Analysis of ASEN and its Variant
High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory mo...
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...
Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity
The combination of multiple antennas and multicarrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The study of such systems, in scenarios that model rea...
A Journey on WiMAX and its Security Issues
Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my...
The Foot Step of mobile network - wireless network architecture
In this paper we discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place...