Legacy Authentication Methods Preventing Key logging Attacks

Abstract

The objective is not protected the authentication process against the shoulder surfing attacker who be able to see or cooperation at the same time both devices over the shoulder, but quite to make it hard forthe opponent to open the attack. We show how visualization can improve not only safety but also usability by proposing two visual authentication protocols: one for password-based authentication, and the other for one-time-password. During thorough study, we show that our protocols are impervious to many of the challenging attacks appropriate to other protocols in the literature. Additionally, using an wide-ranging case study on a prototype of our protocols, we underline the potential of our protocols in real-world consumption addressing users shortcomings and limitations.

Authors and Affiliations

M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, K. Nagababu| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India

Keywords

Related Articles

An Effective Utilization of Concentrated Solar Energy

This thesis describes a new Concentrating Solar Energy with Integral thermal storage that is applied in a solar thermal power station. Solar radiation is concentrated on the boiler of a conventional power station by t...

An Efficient and Scalable Cloud Approach for Managing the Data in the Cloud

In spite of late advances in dispersed Resource Description Frame work (RDF) information administration, preparing a lot of RDF information in the cloud is still extremely difficult. Disregarding its apparently strai...

Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media

Social media influences and control people’s lives where people use social media for various purposes, mainly to exchange information to another person. But, Exchanging information through this enhanced and upgrade...

Secured and Smart Electronic voting system

Now a days various displays are becoming available for implementing a new kind of human computer interaction (HCI) method. Among them, touch panel displays have been used in wide variety of applications and are prov...

Scattered security system for mobile networks through Assorted Contraption

Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...

Download PDF file
  • EP ID EP16578
  • DOI -
  • Views 334
  • Downloads 9

How To Cite

M. Vamsi Krishna, K. Nagababu (2015). Legacy Authentication Methods Preventing Key logging Attacks. International Journal of Science Engineering and Advance Technology, 3(10), 626-629. https://europub.co.uk/articles/-A-16578