An Improved Security Approach For User authentication

Abstract

A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret into two major classes: credential stealing and channel breaking attacks. Credentials such as users’ identifiers, passwords, and keys can be stolen by an attacker when they are inadequately administered. Even if all required information is firmly delivered to a user’s computer, the attacker inhabit on that user’s computer can effortlessly scrutinize and alter the information and show valid-looking yet not to be trusted information. Human user’s contribution in the security protocol is sometimes obligatory to foil this type of attacks but humans are not good at thorny calculations and do not have a plenty memory to remember cryptographically strong keys and signatures. Our approach to resolve the dilemma is to pioneer a transitional device that bridges a human user and a terminal.

Authors and Affiliations

B. Suresh, R. Sailaja

Keywords

Related Articles

Intensity Difference Technique Implementation for Smile Detection

Smile detection has many potential applications. Our paper presents an efficient approach of smile detection. We have combined. Weak Classifiers depending upon intensity differences. This will generate a Strong classi...

Text Detection On Scene Images Using MSER

Text detection and recognition is one of the difficult tasks in the computer vision community and there is a lot of research going on in recent years. This paper focuses on the problem of text detection and recogniti...

Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering

Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...

Performance Comparison on Power Efficient Ad hoc Routing Protocol

Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...

Classification Methods in Data Mining:A Detailed Survey

Classification is a data mining (machine learning) technique and a model finding process that is used for assigning the data into different classes according to specific constrains. In other words we can say that clas...

Download PDF file
  • EP ID EP28312
  • DOI -
  • Views 322
  • Downloads 4

How To Cite

B. Suresh, R. Sailaja (2015). An Improved Security Approach For User authentication. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk./articles/-A-28312