Open Access   Article Go Back

Secure Server Authentication Using Graphical and Session Password

Smruti Bhosale1 , Shradha Botre2 , Gayatri Chandnani3 , Nikita Kamble4

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 75-77, Jun-2016

Online published on Jul 01, 2016

Copyright © Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble, “Secure Server Authentication Using Graphical and Session Password,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.75-77, 2016.

MLA Style Citation: Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble "Secure Server Authentication Using Graphical and Session Password." International Journal of Computer Sciences and Engineering 4.6 (2016): 75-77.

APA Style Citation: Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble, (2016). Secure Server Authentication Using Graphical and Session Password. International Journal of Computer Sciences and Engineering, 4(6), 75-77.

BibTex Style Citation:
@article{Bhosale_2016,
author = {Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble},
title = {Secure Server Authentication Using Graphical and Session Password},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {75-77},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=970},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=970
TI - Secure Server Authentication Using Graphical and Session Password
T2 - International Journal of Computer Sciences and Engineering
AU - Smruti Bhosale, Shradha Botre, Gayatri Chandnani, Nikita Kamble
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 75-77
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1524 1359 downloads 1376 downloads
  
  
           

Abstract

With today’s technology enhancement, it is possible to store your whole life on your hard drive. But at the same time it increases the risk of information theft. Human generally create passwords that are easy to remember. There are many techniques used to crack passwords like Eves dropping, shoulder surfing, social engineering, etc. To make hacking difficult, we should find out techniques that will increase the security level. So this paper proposes a combination of textual session password and graphical passwords. Session passwords enhance security as they are valid only for certain period of time. Graphical passwords on the other hand are easy to memorize and are better resistant to hacking. Algorithms like Pair based algorithm and Cued Click Point algorithm are used to facilitate the combination.

Key-Words / Index Term

SSA, GSP, Security, Authentication

References

[1] J. Kanagarag and K. Noel Binny, “A safe and powerful technique for visual based (secret word) password confirmation”, International journal of advance research in computer science and management studies, Vol. 2, Issue 11, November 2014.
[2] M Shreelatha,M Shashi,M Anirudh,MD Sultan Ahamer,V Manoj kumar, “Authentication schemes for session password using color and images”, International journal of network security and applications, Vol. 3, No.3, May 2011.
[3] R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000. Real User Corporation: Passfaces. www.passfaces.com.
[4] R. Nithya,“Graphical password”, International journal of computer science and information technology research, Vol. 2, Issue 3, September 2014