PCCP:Technique For Online Authentication Presuming Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Attacks on the password in remote login services is increasing day by day. Providing convenient login for legitimate users from prevention such attack is became a challenging problem. From the beginning Automated Turing Tests (ATTs) is continuing to be a successful method to identify malicious login attempts. In this paper, we discuss the in ability of existing approach and proposed a new Password Guessing Resistant Protocol ( PGRP), to restrict the attack. This PGRP method limits the total number of login attempts from unknown user. We analyze the performance of PGRP with two real-world data sets and find it more promising than existing proposals.
Authors and Affiliations
Mohammed Gousiya, Mamidi Veerakumari
A Survey On Multi_Criteria Offloading Decision For Mobile Cloud Computing In Heterogeneous Network
Mobile cloud computing is an technique where mobile applications be built, motorized by means of cloud computing..Wireless network include incomplete resources similar to battery life,storage space capacity,system ba...
The Effect of NCT Techniques on SC-FDMA System in presence of HPA
In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...
Bankruptcy Prediction of Financially Distressed Companies using Independent Component Analysis and Fuzzy Support Vector Machines
The aim of research is to model the dependency of enterprises on their financial ratios for predicting bankruptcy using artificial neural networks combined with fuzzy logic. A sample of companies which are financially...
An Enhanced Technique for Transferring the Image Using Wavelet SVD Mosaic Images Under Color Retrieval Mode
Insurance about advanced media content need turned into a progressively paramount issue for content managers also administration suppliers. Likewise watermark distinguished about illustration, a major engineering org...
Locating Equivalent Servants over P2P Networks
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation...