Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve the effective phishing detection The result shows that if we focus on user also know using a website genuine or not, we can detect genuine site to avoid wasting network resources
Authors and Affiliations
B. K. Prasath, P. Ashok Kumar
[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants
Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...
Security Suite for IT and Telecom Industries
Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...
Role of Computers in Bioinformatics by Using Different Biological Datasets
Abstract: The amount and variety of data in natural sciences increases rapidly. Data abstraction, data manipulation and pattern discovery techniques are of great need in order to deal with such large quantities....
The Evaluation of (CapEx/OpEx) Cost reduction of IPTV Service delivery using SDN Solution
This paper aims to quantify and evaluate the cost saving of offering IPTV service through the ‘Gold’ Network Solutions implemented in IPTV SMC ISP data center; SDN and NFV.Recently, the demand for Streaming services like...
11 × 11 Playfair Cipher based on a Cascade of LFSRs
Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams.&n...