Key logging Prevention by QR code with Visual Authentication
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
Key logging is an activity of capturing users’ keyboard the activity key logger hardware and software. The key loggers secretly monitor and log all keystrokes. Malicious programs, key loggers do not cause any threat to system can be used to intercept passwords unlike other and other of a computer confidential information entered via the keyboard by considering various root kits residing in PCs that breaches the security. Cyber criminals can get user names, email passwords, user in a covert manner. But it uses strokes and records PIN codes, passwords to online gaming accounts, e-payment systems, etc. As a result, it impersonates a user during authentication in financial transactions. To prevent keylogging, the strict authentication is required. The QR account numbers, email addresses, code can be used to design the protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in authentication protocol. Through accurate analysis, real-world applications especially in online transactions, visual authentication the strict security requirements can be satisfied.
Authors and Affiliations
Kodiyala Devi Sireesha| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: sireesha4cse@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
MODELLING AND SIMULATION OF LOSSLESS DAMPING REDUCTION BY VECTOR CONTROLLED AC MOTOR DRIVE WITH AN EFFICIENT LC FILTER
In this paper Active damping technique is used to damp out the unwanted resonant frequency oscillations and proposed for lossless damping of vectorcontrolled ac drives with an efficient LC-Filter. This paper mainly co...
Formulating Heat Transfer Across The Head-Media Interface- HAMR
All past thermal demonstrating on warmth trade between hard disk drive (HDD) head and media regarded media as a warmth sink with uniform encompassing temperature. However in warmth helped attractive recording (HAMR)...
Hybrid Source Based Transformer Coupled Bidirectional Dc-Dc Converter for Domestic Applications
Hybrid power system can be utilized to decrease energy storage necessities. There is expanding interest for the utilization of exchange or sustainable power sources to accomplish perfect and ease power for Residential...
A protection PWS system UPS to sum up profiles as per client security prerequisites
Personalized web search has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information d...
Privacy Preservation and traceability support using Public Auditing Mechanism
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the ori...