Advanced Safe PIN-Entry Against Human Shoulder-Surfing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: When users insert their passwords in a common area, they might be at risk of aggressor stealingtheir password. The PIN entry can be perceived by close by adversaries, more effectually in a crowded place. Anew technique has been established to cope with this problem that is cryptography prevention techniques.Instead, there have been alternative approaches among them, the PIN entry was elegant because of itssimplicity and accessibility. The basic BW method is focused to withstand a human shoulder surfing attack. Inevery round, a well ordered numeric keypad is colored at odd. A user who knows the accurate PIN digit canenter by pressing the separate color key. The IBW method is examined to be confidential against human nemesisdue to the restricted cognitive abilities of humans. Also the IBW method is proven to be robust against anyhacking attacks.
Authors and Affiliations
Ms. R Revathy , Mrs. R. Bama
A Review Paper on Thinning of Image Using Zhang and Suen Algorithm and Neural Network
Abstract: This review paper provides a concise survey on different techniques for thinning and their comparison in image processing. Thinning is one of the fundamental requirements is to represent the structural shape of...
A software tool that provides relevant information for diabetic patients to help prevent diabetic foot[i][u][/u][/i]
Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic...
An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment
Abstract: Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security. Since data is expo...
Intrusion Detection System using Apache Spark Analytic System
In this study, an Intrusion Detection System (IDS) is proposed based on the use of machine learning and distributed computing. The proposed system uses classification techniques that are implemented in the built-in machi...
A Parallel Algorithm for Factorization of Big Odd Numbers
The article puts forward an algorithm to factorize a big odd number by means of subdividing the searching interval into finite independent subintervals. A divisor of a big odd number can be found in one of the subinterva...