Secured Login Authentication on Key Attackers
نویسندگان
چکیده
منابع مشابه
Password Authentication Scheme with Secured Login Interface
This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his p...
متن کاملThe Secured Authentication in VANET Through Public Key Cryptography
Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs).In a VANET, vehicles will rely on the integrity of received data for deciding when to present alerts to drivers. In this paper, we investigate the authentication issues with privacy preservation and non-repudiation in VANETs. We propose a novel framework with preservationand repudiation (ACPN) for VANET...
متن کاملThe Distributed Authentication Login Scheme
In distributed system environment, security of system is an important issue whose basis is authentication protocol. Authentication protocol requires a authentication server which will decide login of users, and the server will be the main target of attacks. In this paper, we present a distributed authentication protocol model, whose goals are to avoid one point of attack and to increase availab...
متن کاملSecured Login for Gmail Using Pattern Classifier with Voice Recognition
----------------------------------------------------------------------------------------------------------------ABSTRACT Fractal detection and recognition is a unique process for identifying every human being. This concept is more effective interms of authentication into the service. This module permits us to response in building each and every image sets followed by the measure of similarity m...
متن کاملProvable Secured Hash Password Authentication
The techniques such as secured socket layer (SSL) with clientside certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user‟s plaintext password to a remote web server, often using SSL. Even when used over an encrypted connection, this form of password authentication is vul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.4247