An Improved Security Approach For User authentication

Abstract

A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret into two major classes: credential stealing and channel breaking attacks. Credentials such as users’ identifiers, passwords, and keys can be stolen by an attacker when they are inadequately administered. Even if all required information is firmly delivered to a user’s computer, the attacker inhabit on that user’s computer can effortlessly scrutinize and alter the information and show valid-looking yet not to be trusted information. Human user’s contribution in the security protocol is sometimes obligatory to foil this type of attacks but humans are not good at thorny calculations and do not have a plenty memory to remember cryptographically strong keys and signatures. Our approach to resolve the dilemma is to pioneer a transitional device that bridges a human user and a terminal.

Authors and Affiliations

B. Suresh, R. Sailaja

Keywords

Related Articles

Efficient Data Coordination Technique for Data Verification and Integration in Multi-Cloud Systems

Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...

Text Mining For Retrieving The Vital Information

A huge amount of data is being collected in the data repository today. Typically there is an enormous space from the stored data to the information that could be assembled from the data. This evolution won't occur rep...

AR Simulated Camera

This paper provides an interactive idea for interior designing application using augmented reality (AR). Augmented reality merges real world and virtual world together. Due to the developing technology and lack of time,...

A System to Minimize The Storing And Managing Secret Keys Expense Using KAC

Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-si...

Design and Functional Verification of Four Way Set Associative Cache Controller

This project describes the design of a Cache Controller that will handle 32Kbyte 4 ways with 8word block size cache. A cache controller is a device that used to sequence the read and write of the cache storage array....

Download PDF file
  • EP ID EP28312
  • DOI -
  • Views 309
  • Downloads 4

How To Cite

B. Suresh, R. Sailaja (2015). An Improved Security Approach For User authentication. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk./articles/-A-28312