Web Based Security using oPass System: A Survey
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 5
Abstract
Password authentication is an essential form of user authentication both on the Internet and for internal organizational computing systems. Password protection schemes are used to protect relatively low-sensitivity systems such as access to online archives as well as highly sensitive corporate intranets or personal bank accounts. Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Users often select weak passwords and reuse the same passwords across different websites. Routinely reusing passwords causes a domino effect; when an adversary compromises one password, she will exploit it to gain access to more websites.
Authors and Affiliations
Ms. Bhosale Akshaya A
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
The intrusion detection systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a fuzzy genetic algorithm (FGA) for...
Effect of Multi-Walled Carbon Nanotubes on Automotive and Aerospace Applications- Case Study
Generally, MWCNTs are allotropes of carbon with a cylindrical nanostructure. Nano tubes have been constructed with length-to-diameter ratio of up to 132,000,000:1, significantly larger than for any other material. These...
Impact of Electronic Gadgets
The electronic gadgets are very popular among the people and the people are very interested used of the electronic gadgets. So, here based on the craze among the people the survey based study is performed and collected d...
A Closure Looks to Load Balanced Routing Protocol in Ad-Hoc Network
A wireless Mobile Ad hoc Network (MANET) is an mobile network which is infrastructure-less &based on radio to radio multi-hoping and it has nora fixed router centralized controller. All node sare enabled to move so they...
Note on lexicographical ordering
Farhadinia (2016) developed a lexicographical ordering with respect to hesitant fuzzy elements. In this article, we will demonstrate that his novel approach fails to satisfy the following three issues: (i) His ranking is...