M-Wallet Security using Cued Click Points
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of alternative method where graphical images are used as passwords as human brains are better at recognizing images than text. The main goal of our work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult password to guess so that various security threats like brute force attacks, dictionary attacks, social engineering attacks ,shoulder surfing attacks can be successfully removed.
Authors and Affiliations
Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra , Prof. Sonali Madankar
An Efficient Method for Noisy Annotation Data Modeling
Abstract : Probabilistic topic models are used for analyzing and extracting content-related annotations from noisy annotated discrete data like WebPages on WWW and these WebPages are stored using social bookmarking servi...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threat...
Penetrating Windows 8 with syringe utility
: Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...
Optimal Content Downloading in Vehicular Networks
Abstract: We consider a system where users aboardcommunication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services...
Selecting the correct Data Mining Method: Classification & InDaMiTe-R
One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision requir...