Legacy Authentication Methods Preventing Key logging Attacks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
The objective is not protected the authentication process against the shoulder surfing attacker who be able to see or cooperation at the same time both devices over the shoulder, but quite to make it hard forthe opponent to open the attack. We show how visualization can improve not only safety but also usability by proposing two visual authentication protocols: one for password-based authentication, and the other for one-time-password. During thorough study, we show that our protocols are impervious to many of the challenging attacks appropriate to other protocols in the literature. Additionally, using an wide-ranging case study on a prototype of our protocols, we underline the potential of our protocols in real-world consumption addressing users shortcomings and limitations.
Authors and Affiliations
M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, K. Nagababu| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India
Premature Breast Cancer Mammographic Detection Using Image Segmentation Approaches
In the current era digital image processing occupies a dynamic role in every aspect of human survival. Image processing refers to progress digital images and mined attributes from images. In this paper we describe th...
A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks
In the network denial of service (DoS) and distributed DoS (DDoS) attacks intend to prevent legitimate clients from accessing services are considered a serious hazard to the availability and reliability of the intern...
Adopting Cloud Computing Technique for Efficient Event Forwarding Service To Users
Forwarding large volume of live content to relevant users in scalable efficient way in emergency application is main challenging task. One of the model named as the publisher and subscribe is used to forward the even...
Green Internet Routing Between Traffic Volume and Power Consumption
We plan a green Internet routing plan, where the routing can lead movement in a way that is green. We contrast from past reviews where they switch organize parts, for example, line cards and routers, into rest mode....
Optimal Object Placement Policies To Minimize The NetworkWide Content Provisioning Cost
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...