Two Level Authentication System Based on Pair Based Authentication and Image Selection
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
This paper presents a two level authentication using pair based authentication and image selection. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are vulnerable to eaves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords have been introduced as an alternative to textual passwords. But same as textual passwords, shoulder surfing attacks make most of the graphical schemes vulnerable. To address this problem, textual passwords can be combined with graphical schemes in what gives a two level security. This paper presents an integrated evaluation of the pair based passwords and graphical password scheme, including usability and security evaluations and implementation considerations.
Authors and Affiliations
Madhuri Achmani, Radhika Dehaley, Anuja Gaonkar, Anindita Khade
Experimental Investigation on the Performance of Plastic Aggregate Concrete
This study is intended to explore the suitability of recycled high density polyethylene (HDPE) as coarse aggregate in concrete. Effect of replacement of coarse aggregate with various percentages (0% to 40%) of plastic a...
A Review of complexity method for wireless Channel Estimation using a BEM
Our channel estimation method differs in its ability to estimate fast time-varying wireless channel since pilot tones are inserted into each OFDM block, and in its explicit relation with space-frequency code design whic...
A performance monitoring tool for translators
We exhibit a device for the assessment of interpretation quality. In the first place, the run of the mill prerequisites of such a device in the system of machine interpretation (MI) exploration are examined. We characte...
Security Problems and Their Defenses in TCP/IP Protocol Suite
The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an...
Differentiate Different Methodology for Design of Vedic Multiplier
Multiplier is one of the most important part in any processor speed which improves the speed of the operation for example in special application processors like Digital Signal Processor (DSPs). Basically, the operationa...