Open Access   Article Go Back

Authentication using Mixed-mode approach.

Prasad N. Urankar1 , Prasanna J. Shete2

Section:Technical Paper, Product Type: Journal Paper
Volume-4 , Issue-3 , Page no. 133-135, Mar-2016

Online published on Mar 30, 2016

Copyright © Prasad N. Urankar , Prasanna J. Shete . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prasad N. Urankar , Prasanna J. Shete , “Authentication using Mixed-mode approach.,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.133-135, 2016.

MLA Style Citation: Prasad N. Urankar , Prasanna J. Shete "Authentication using Mixed-mode approach.." International Journal of Computer Sciences and Engineering 4.3 (2016): 133-135.

APA Style Citation: Prasad N. Urankar , Prasanna J. Shete , (2016). Authentication using Mixed-mode approach.. International Journal of Computer Sciences and Engineering, 4(3), 133-135.

BibTex Style Citation:
@article{Urankar_2016,
author = {Prasad N. Urankar , Prasanna J. Shete },
title = {Authentication using Mixed-mode approach.},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2016},
volume = {4},
Issue = {3},
month = {3},
year = {2016},
issn = {2347-2693},
pages = {133-135},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=842},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=842
TI - Authentication using Mixed-mode approach.
T2 - International Journal of Computer Sciences and Engineering
AU - Prasad N. Urankar , Prasanna J. Shete
PY - 2016
DA - 2016/03/30
PB - IJCSE, Indore, INDIA
SP - 133-135
IS - 3
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1507 1396 downloads 1378 downloads
  
  
           

Abstract

Text passwords have been widely used for user authentication, e.g., by almost all websites on the Internet. However, it is well-known that text passwords are insecure for a variety of reasons. For example, users tend to choose simple passwords which can be remembered easily. In favor of memorability, making them subject to dictionary attacks; and text passwords can be stolen by malicious software (e.g., keystroke loggers) when being entered from keyboards. Phishing is another serious threat to text passwords, by which, a user could be persuaded to visit a forged website and enter their passwords. The system aim is to grant access to a legal user, and to prevent the system from illegal or non-authorized person.

Key-Words / Index Term

Text Password, Passfaces, Authentication, Authorized user, Phishing, Hybrid Password, BODMAS, Fisher Yates Randomizer Algorithm

References

[1] S.Anna Suganthi K.Karnavel “Virtual Password with Secret Function and Codebook(VFC) scheme for Protecting User’s Password as a Test for Security”Transactions on Engineering and Sciences Vol.2, Issue 11, November 2014.
[2] Bin B. Zhu, Jeff Yan, Guanbo Bao,maowei Yang and Ning Xu “Captcha as Graphical Password- A New Security Primitive Based on Hard AI Probelms”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,VOL.9, NO.6, JUNE 2014.
[3] Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar “New Era of authentication: 3-D Password”International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 5, November 2012.
[4] Syed Shabih ul Hasan Naqvi ,Samiullah Afzal IEEE “Operation Code Authentication Preventing Shoulder Surfing Attacks”. 2010.
[5] Wei Hu,Xiaoping Wu, Guoheng Wei ,” The Security Analysis of Graphical Passwords” International Conference on Communications and Intelligence Information Security,2010 .
[6] http://www.mathsisfun.com/operation-order- bodmas.html
[7] www.ask.com
[8] www.wikipidia.com
[9] www.answers.yahoo.com
[10] www.ehow.com