M-Wallet Security using Cued Click Points
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of alternative method where graphical images are used as passwords as human brains are better at recognizing images than text. The main goal of our work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult password to guess so that various security threats like brute force attacks, dictionary attacks, social engineering attacks ,shoulder surfing attacks can be successfully removed.
Authors and Affiliations
Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra , Prof. Sonali Madankar
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
AUTOPARK: A Sensor Based, Automated, Secure and Efficient Parking Guidance System
Nowadays, due to modern and lavish lifestyles people prefer their own vehicles while going anywhere, resulting in increased traffic congestion and parking problems. In this paper, we propose and present a complet...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an im...
Modelling and Control of a Robotic Arm Using Artificial Neural Network
Often it can be seen that men with a lost arm face severe difficulties doing daily chores. Artificial Intelligence could be effectively used to provide some respite to those people. Neural networks and their &nbs...
Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm
In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...