Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

An Authentication of Significant security for accessing Password through Network System
Syed Umar
MLR Institute of Technology, Hyderabad, India
Abstract: Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user’s password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.
Keywords: Security, Authentication, Messages, OPass, Networking, Password An Authentication of Significant security for accessing Password through Network System
DOI:https://doi.org/10.6025/jisr/2019/10/1/18-23
Full_Text   PDF (218 KB)   Download:   149  times
References:[1] Hung-Min Sun, Yao-Hsin Chen., Yue-Hsun Lin. (2012). oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks, IEEE Transactions On Information Forensics And Security, 7(2) (April). [2] Florencio, D., Herley, C. (2007). A large- scale study of web password habits, In: WWW ’07: Proc. 16th Int. Conf. World Wide Web., New York, 2007, p. 657–666, ACM. [3] Chiasson, S., Forget, A., Stobert, E., P. C. (2009). Multiple password interference in text passwords and click-based graphical passwords, In: CCS ’09: Proc. 16th ACM Conf. Computer Communications Security, New York, 2009, p. 500–511, ACM. [4] Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.-C. (2006). Design and evaluation of a shoulder-surfing resistant graphical password scheme, In: AVI ’06: Proc. Working Conf. Advanced Visual Interfaces, New York, 2006, p. 177–184, ACM. [5] Gawand, S., Felten, E. W. (2006). Password management strategies for online accounts, In: SOUPS ’06: Proc. 2nd Symp. Usable Privacy. Security, New York, 2006, p. 44–55, ACM. [6] Ives, B., Walsh, K. R., Schneider, H. (2004). The domino effect of password reuse, Commun. ACM, 47 (4) 75–78. [7] Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N. (2005). Passpoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies, 63 (1–2)102– 127. [8] Pinkas, B., Sander, T. (2002). Securing passwords against dictionary attacks, In: CCS ’02: Proc. 9th ACM Conf. Computer Communications Security, New York, 2002, p. 161–170, ACM. [9] Thorpe, J., Van Oorschot, P. (2004). Towards secure design choices for implementing graphical passwords, presented at the 20th. Annu. Computer Security Applications Conference., 2004. [10] Jermyn, A., Mayer, F., Monrose, M. K., Reiter, Rubin, A. D. The design and analysis of graphical passwords, In: SSYM’99: Proc. 8thConf. USENIX Security Symp., Berkeley, CA, 1999, p. 1–1, USENIX Association. [11] Perrig, A., Song, D. Hash visualization: A new technique to improve real-world security, In: Proc. Int.Workshop Cryptographic Techniques-Commerce, Citeseer, 1999, p. 131– 138.

Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info