M-Wallet Security using Cued Click Points

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of alternative method where graphical images are used as passwords as human brains are better at recognizing images than text. The main goal of our work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult password to guess so that various security threats like brute force attacks, dictionary attacks, social engineering attacks ,shoulder surfing attacks can be successfully removed.

Authors and Affiliations

Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra , Prof. Sonali Madankar

Keywords

Related Articles

 An Efficient Method for Noisy Annotation Data Modeling

Abstract : Probabilistic topic models are used for analyzing and extracting content-related annotations from noisy annotated discrete data like WebPages on WWW and these WebPages are stored using social bookmarking servi...

 A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power  Consumption

 In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of  security threat...

 Penetrating Windows 8 with syringe utility

 : Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...

 Optimal Content Downloading in Vehicular Networks

 Abstract: We consider a system where users aboardcommunication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services...

 Selecting the correct Data Mining Method: Classification &  InDaMiTe-R

 One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision  requir...

Download PDF file
  • EP ID EP126601
  • DOI 10.9790/0661-162106369
  • Views 110
  • Downloads 0

How To Cite

Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra, Prof. Sonali Madankar (2014).  M-Wallet Security using Cued Click Points. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 63-69. https://europub.co.uk./articles/-A-126601