Authentication using Mixed-mode approach.
Prasad N. Urankar1 , Prasanna J. Shete2
Section:Technical Paper, Product Type: Journal Paper
Volume-4 ,
Issue-3 , Page no. 133-135, Mar-2016
Online published on Mar 30, 2016
Copyright © Prasad N. Urankar , Prasanna J. Shete . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Prasad N. Urankar , Prasanna J. Shete , “Authentication using Mixed-mode approach.,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.133-135, 2016.
MLA Style Citation: Prasad N. Urankar , Prasanna J. Shete "Authentication using Mixed-mode approach.." International Journal of Computer Sciences and Engineering 4.3 (2016): 133-135.
APA Style Citation: Prasad N. Urankar , Prasanna J. Shete , (2016). Authentication using Mixed-mode approach.. International Journal of Computer Sciences and Engineering, 4(3), 133-135.
BibTex Style Citation:
@article{Urankar_2016,
author = {Prasad N. Urankar , Prasanna J. Shete },
title = {Authentication using Mixed-mode approach.},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2016},
volume = {4},
Issue = {3},
month = {3},
year = {2016},
issn = {2347-2693},
pages = {133-135},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=842},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=842
TI - Authentication using Mixed-mode approach.
T2 - International Journal of Computer Sciences and Engineering
AU - Prasad N. Urankar , Prasanna J. Shete
PY - 2016
DA - 2016/03/30
PB - IJCSE, Indore, INDIA
SP - 133-135
IS - 3
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1583 | 1456 downloads | 1463 downloads |
Abstract
Text passwords have been widely used for user authentication, e.g., by almost all websites on the Internet. However, it is well-known that text passwords are insecure for a variety of reasons. For example, users tend to choose simple passwords which can be remembered easily. In favor of memorability, making them subject to dictionary attacks; and text passwords can be stolen by malicious software (e.g., keystroke loggers) when being entered from keyboards. Phishing is another serious threat to text passwords, by which, a user could be persuaded to visit a forged website and enter their passwords. The system aim is to grant access to a legal user, and to prevent the system from illegal or non-authorized person.
Key-Words / Index Term
Text Password, Passfaces, Authentication, Authorized user, Phishing, Hybrid Password, BODMAS, Fisher Yates Randomizer Algorithm
References
[1] S.Anna Suganthi K.Karnavel “Virtual Password with Secret Function and Codebook(VFC) scheme for Protecting User’s Password as a Test for Security”Transactions on Engineering and Sciences Vol.2, Issue 11, November 2014.
[2] Bin B. Zhu, Jeff Yan, Guanbo Bao,maowei Yang and Ning Xu “Captcha as Graphical Password- A New Security Primitive Based on Hard AI Probelms”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,VOL.9, NO.6, JUNE 2014.
[3] Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar “New Era of authentication: 3-D Password”International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 5, November 2012.
[4] Syed Shabih ul Hasan Naqvi ,Samiullah Afzal IEEE “Operation Code Authentication Preventing Shoulder Surfing Attacks”. 2010.
[5] Wei Hu,Xiaoping Wu, Guoheng Wei ,” The Security Analysis of Graphical Passwords” International Conference on Communications and Intelligence Information Security,2010 .
[6] http://www.mathsisfun.com/operation-order- bodmas.html
[7] www.ask.com
[8] www.wikipidia.com
[9] www.answers.yahoo.com
[10] www.ehow.com