An Improved Security Approach For User authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret into two major classes: credential stealing and channel breaking attacks. Credentials such as users’ identifiers, passwords, and keys can be stolen by an attacker when they are inadequately administered. Even if all required information is firmly delivered to a user’s computer, the attacker inhabit on that user’s computer can effortlessly scrutinize and alter the information and show valid-looking yet not to be trusted information. Human user’s contribution in the security protocol is sometimes obligatory to foil this type of attacks but humans are not good at thorny calculations and do not have a plenty memory to remember cryptographically strong keys and signatures. Our approach to resolve the dilemma is to pioneer a transitional device that bridges a human user and a terminal.
Authors and Affiliations
B. Suresh, R. Sailaja
Intensity Difference Technique Implementation for Smile Detection
Smile detection has many potential applications. Our paper presents an efficient approach of smile detection. We have combined. Weak Classifiers depending upon intensity differences. This will generate a Strong classi...
Text Detection On Scene Images Using MSER
Text detection and recognition is one of the difficult tasks in the computer vision community and there is a lot of research going on in recent years. This paper focuses on the problem of text detection and recogniti...
Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering
Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...
Performance Comparison on Power Efficient Ad hoc Routing Protocol
Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...
Classification Methods in Data Mining:A Detailed Survey
Classification is a data mining (machine learning) technique and a model finding process that is used for assigning the data into different classes according to specific constrains. In other words we can say that clas...