REVIEW OF PASSWORD PROTECTING MECHANISM 

Abstract

In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password without knowledge of original user and they may do any fraudulent activities on the victim’s account. The passwords can be stolen by using any one of the attack mechanism such as Phishing attack, Password Stealing Program Attack and etc… The user may use personal details in online environment. These personal details must be secured. There are many types of mechanisms are available to secure the password and user’s data. This paper makes a survey about such types of protection mechanism and makes awareness to the people. 

Authors and Affiliations

Ms. K. Banu priya , Dr. P. Venkateswari

Keywords

Related Articles

Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology 

The growth of Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation (DE). Existing Internet evaluation mechanisms,...

A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot o...

Improved wavelet based compression with adaptive lifting scheme using Artificial Bee Colony algorithm

Abstract—The increment in the sizes of the images by the technological advances accompanies high demand for large capacities, high performance devices, high bandwidths etc. Therefore, image compression techniques are ess...

QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES USING DATA AGGREGATORS

Continuous aggregation queries are used to monitor the changes in data with time varying for online decision making. For contin uous queries low cost and scalable technique s used a network of aggregators. I...

Restricting mischievous users in anonymizing networks 

Anonymizing networks such as knoll tolerate users to admittance Internet services clandestinely by using a progression of routers to bury the client’s IP address from the server. The achievement of such networks,...

Download PDF file
  • EP ID EP130925
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Ms. K. Banu priya, Dr. P. Venkateswari (2013). REVIEW OF PASSWORD PROTECTING MECHANISM . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 539-545. https://europub.co.uk/articles/-A-130925