Implementation of Secured password for Web applications using two server model
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
The secured password is the most commonly used uthentication mechanism in security applications [11]. There ay be chances of password hacking from the hackers, so hat t is very essential to protect password information while nding equest to the servers. Early Web Application used entral tabase as the password authentication scheme. It has been ne of the biggest challenges in deploying sharing password thenticated key exchange solutions in practice using multiple servers. Several multi server schemes have been proposed for authentification. This work emphasis on shared secured ssword for web application using the two server model. Here this system will overcome all the previously proposed single nd multi server model authentication systems. This new ystem is eing developed as secured password for web pplication viz, thentication in VoIP (voice over internet rotocol) services, DA evices ete.
Authors and Affiliations
Dr. R. Shashikumar , C. N. Vijay kumr , H. M. Kotresh , Vijay kumar K
Filtering Non-Stationary Noise in Speech Signals using Computationally Efficient Unbiased and Normalized Algorithm
Extraction of high resolution information signals is important in all practical applications. The Least Mean Square (LMS) algorithm is a basic adaptive algorithm has been extensively used in many applications as a conseq...
Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
The enormous potential research efforts have been taken for sophisticated and natural human computer interaction using gestures. This work has got motivated from long ago as 1980’s since sign language is the only communi...
Feature Extraction in Medical Image using Ant Colony Optimization : A Study
The front end of most vision systems consists of an edge detection as preprocessing. The vision of objects is easy for the human because of the natural intelligence of segmenting, pattern matching and recognizing very co...
Survey of Attacks on Mobile AdhocWireless Networks
Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the c...
Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm
In data mining research, generating frequent items from large databases is one of the important issues and the key factor for implementing association rule mining tasks. Mining infrequent items such as relationships amon...