Online Password Guessing Attacks by Using Persuasive Click Point with Dynamic User Block
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The goal of knowledge-based authentication system is to guide the users in creating graphical passwords. User often creates memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for user to remember. So the researchers of modern days use alternative methods where graphical pictures are used as a password. Human brain is good in remembering picture than textual character. Various graphical password techniques are used, now PCCP with dynamic user blocks approach presents a more feasible way of varying the security level depending upon the user’s requirements. The proposed system lets the user to select the security level. In order to help the user to memorize the password audio support can also be provided. The system influence the user to create a click based graphical password, which is more random, so that it will be difficult for the hackers to guess it.
Authors and Affiliations
P. Kalaivizhi , Dr. S. Thiru Nirai Senthil
Abalone Age Prediction using Artificial Neural Network
Abstract: Artificial Neural Networks are the intelligent computation systems that can be used to solve various challenging problems such as compression, optimization, classification, pattern recognition and prediction. I...
Research Paper Selection Based On an Ontology and Text MiningTechnique Using Clustering
Abstract: Research Paper Selection is important decision making task for the Government funding Agency,Universities, research Institutes. Ontology is Knowledge Repository in which concepts and terms defined as well...
Pleurogenoides neelimae n. sp. (Trematoda: Pleurogenidae) from the intestine of a freshwater fish Wallago attu (Bloch)
Pleurogenoides neelimae n. sp. from a fresh water siluroid fish, Wallago attu (Bloch) is described. It is distinguished from other species in having an oral sucker more or less equal to the ventral sucker, genital pore i...
Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
Abstract: Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secur...
Cloud Computing: Demand and Supply in Banking, Healthcare and Agriculture
Abstract: Right from the Stone Age one law is governing the market for every generation and that well acknowledged law is “Law of Demand & Supply”. ICT is not far away from this law. It is a well-known fact t...