Security Built On Dynamic Reusable Passwords On Online Purchase
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
is providing different types of applications to the user. Based on the user requirement internet is growing longer in the day-to-day life for the E-transaction process internet is the main source for all applications when increasing of the E-transaction usage in the internet as well as fraud is also increasing, for the E-transaction mostly we are using smart cards only. To protect our bank details and to avoid unauthorized person usage we can use TWO FACTOR AUTHENTICATION mechanism. one is USER KNOWS and another one is THEY HAVE TO KNOW almost all banking systems are satisfied with this system because based on the initial password(SEED) we can get number of multiple one time passwords(OTP) to the mobile phone. through the process of OTP generation mobile phone is working as a software token the different number of multiple OTPs are coming through by the SMS to the mobile phone.IN the paper we can mainly focus on decrease the usage of fraud in the internet by using the otp through TWO FACTOR AUTHENTICATION mechanism
Authors and Affiliations
Rajeswari. P , C. Rajendra
Improved Shortest Remaining Burst Round Robin (ISRBRR) Using RMS as its time quantum
Round Robin (RR) performs optimally in timeshared systems because each process is given an equal amount of static time quantum. But the effectiveness of RR algorithm solely depends upon the choice of time quantum....
Enhancing Key Management In Intrusion Detection System For Manets
Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is n...
AN EXTENSIVE REVIEW OF CURRENT TRENDS IN STEGANALYSIS
Steganography refers to the art of secret communication while steganalysis is the art and science of detection of the presence of steganography. Both steganography and steganalysis received a great deal of attent...
A Survey on Windows Component Loading Vulnerabilities
Dynamic loading is a mechanism by which a computer program can, at run time, load a library memory, retrieve the addresses of functions and variables contained in library, execute those functions, and unload the library...
Monitoring Data Integrity while using TPA in Cloud Environment
Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminat...