Securing SMS-based approach for two factor authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Nowadays most of the institution faces a huge problem related to security. Most of the institution uses the traditional way to provide authentication. That means most them are use passwords as an authentication mechanism. Now most of the users use same password in different accounts to avoid their work loads. But this is not a secure way. So many other mechanisms are designed for providing security such as two factor authentication. This paper discuss about a securing two factor authentication using mobile phones. Here we use mobile phones for generating OTPs. Also adapt SMS-Based approach for two factor authentication and provide security to the SMS-Based OTPs.
Authors and Affiliations
Anu Varghese, Er. Deepthy Mathews
Mobile to Mobile data transfer through Human Area Network
Technologies enabling communication between people and devices in close proximity are required for all modern user friendly gadgets. This paper demonstrates a design and implementation of Human Area Network technolog...
Image Processing using Bilateral Filtering with future scope in Parellel Processing
Bilateral filtering smooths images while maintaining edges, by use of a nonsimilar combination of nearing image values. The method is less time consuming, local, and easy. It clubs together gray levels or colors based...
A Stochastic Model to Evaluate The Performance of An IAAS Cloud System
Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...
Two Techniques for Analyze Network Traffic to Identify Dos Attack
Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...
Coverage Modeling For Verification Of Floating Point Arithmetic Units
Scope displaying is one of the key errands of the confirmation stream in frameworks improvement. The subsequent model is regularly used to assess the advancement and nature of the check process; it likewise gives a v...