Filters








1,778 Hits in 7.1 sec

Using hash visualization for real-time user-governed password validation

Julian Fietkau, Mandy Balthasar
2019 Mensch & Computer  
Building upon work by Perrig & Song [21], we propose a novel hash visualization algorithm and examine its usefulness for user-governed password validation in real time.  ...  We also provide a set of design recommendations for systems where hash visualization for password validation is performed in real time, i.e. as the user is in the process of typing their password.  ...  Michael Koch for constructive feedback on an early version of this article, and Mohamed Khamis for a thought-provoking discussion of password validation at CHI 2019 as well as encouraging us to pursue  ... 
doi:10.18420/muc2019-ws-302-04 dblp:conf/mc/FietkauB19 fatcat:3kyf4tramzdrvok5qhcfycwu6a

Data Security System in Cloud by Using Fog Computing and Data Mining

Parashar Sangle
2016 International Journal Of Engineering And Computer Science  
In any case if the real user gets trapped in this system then user can challenge the system asking for one-time password (OTP) for verification.  ...  In user panel the onetime password plays a very important role; if in case real user gets decoy data from cloud server, the user can request for one-time password for verification challenge.  ...  It is used to filter the data which is locally consumed and send to the higher tiers for visualization, transactional analytics and real time report data.  ... 
doi:10.18535/ijecs/v5i12.40 fatcat:4o4yayjaszb2nlxccfaswvwroq

Data Security System in Cloud by Using Fog Computing and Data Mining

Parashar Sangle, Romit Deshmukh, Rohit Ghodake, Akash Yadav, Jitendra Musale
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In any case if the real user gets trapped in this system then user can challenge the system asking for one-time password (OTP) for verification.  ...  In user panel the onetime password plays a very important role; if in case real user gets decoy data from cloud server, the user can request for one-time password for verification challenge.  ...  It is used to filter the data which is locally consumed and send to the higher tiers for visualization, transactional analytics and real time report data.  ... 
doi:10.23956/ijarcsse/v7i3/0119 fatcat:s64paxjzg5dljeagfu2kptd5ze

Detection Of Phishing Websites And Secure Transactions

R. Dhanalakshmi, C. Prabhu, C. Chellapan
2011 International Journal of Communication Networks and Security  
To enable secure transactions ,Password hashing has been done with MD5 hashing algorithms that strengthens web password authentication.  ...  If the user is valid, get a session key via mobile, through which further access can be done  ...  ACKNOWLEDGMENT This work is supported by the NTRO, Government of India.  ... 
doi:10.47893/ijcns.2011.1014 fatcat:47zw3ntpdjeunb2ffwqhbzwwsm

TEXT FILE ENCRYPTION USING FFT TECHNIQUE IN LAB VIEW 8.6

Sudha Rani.K .
2012 International Journal of Research in Engineering and Technology  
There are many traditional scrambling methods used in single dimension such as time or frequency domain scrambling.  ...  Digital transmission is always much more efficient than analog transmission, and it is much easier for digital encryption techniques to achieve a very high degree of security.  ...  On the display the once a valid user enters the username, password and OK button disappear to avoid any confusion.  ... 
doi:10.15623/ijret.2012.0101005 fatcat:4rnwvsxz6fgetfhpdxr6krk7ee

SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks [article]

Zuoguang Wang, Jiaqian Peng, Hongsong Zhu, Limin Sun
2021 arXiv   pre-print
Experiment result shows that the SEIGuard scheme can effectively protect server-side SEI against brute-force attacks, and SEIGuard also has an impressive real-time response performance that is better than  ...  In SEIGuard, the password check in authentication is omitted and this design is further combined with the SEI encryption design using honey encryption.  ...  In general, the user password will store in plaintext, hash or salting hash (as key).  When a user attempt to log in the system using certain username and password, the server will first  ... 
arXiv:2108.06529v2 fatcat:cdbzdzq2erh3zhm35jdyphe6ze

Bitcoin Generation using Blockchain Technology

Balajee Maram
2018 JOIV: International Journal on Informatics Visualization  
This is the initiation for new trend for security to the digital transactions in the world. This paper presents the logic in the blockchain and Bitcoin generation process using blockchain technology.  ...  The Bitcoins are generated from the mining of a block for the miner. Every user knows about each and every Bitcoin transaction in the blockchain network.  ...  It is very useful for servers, because the servers are responsible to store the passwords with high security. So all passwords are converted into hash and stored in the server database.  ... 
doi:10.30630/joiv.2.3.109 fatcat:6ay7plevyzgufmwfu5rh5dbnse

Smart field artillery information system: Model development with an emphasis on collisions in single sign-on authentication

Nikola Manev, Jugoslav Achkoski, Drage Petreski, Milan Gocic, Dejan Rancic
2017 Vojnotehnički Glasnik  
This paper proposes a model for a Smart Field Artillery Information System (SFAIS) that can be used in a military environment.  ...  Additionally,and even more importantly, the probability of collisions in hash functions during Single Sign-on authentication is presented for proving existing security shortcomings in distributed computer  ...  To illustrate the real time working capability of a SOA platform as well as the hash function application, it is best to provide a real-life example of an Information system whose access is open only to  ... 
doi:10.5937/vojtehg65-12703 fatcat:43esccdpb5bpjp43g5afvt5hsq

Securely Eradicating Cellular Dependency for E-Banking Applications

Bisma Rasool, Tehseen Mehraj, Burhan Ul, Asifa Mehraj, Zahoor Ahmad
2018 International Journal of Advanced Computer Science and Applications  
This is an initiative to eradicate the dependency on Global System for Mobile communication (GSM) that is the most popular means of sending the One-Time-Passwords to the users availing e-banking facilities  ...  For eradicating the necessity of creating and managing passwords, a variety of solutions are prevalent, the traditional ones being the usage of One-Time-Password (OTP) that refers to a single session/transaction  ...  Moreover, replaying reusable passwords are restricted by encoding passwords to be used one time.  ... 
doi:10.14569/ijacsa.2018.090253 fatcat:wnsq3lutangsvcfbzngwc73nq4

On the security of SSL/TLS-enabled applications

Manik Lal Das, Navkar Samdaria
2014 Applied Computing and Informatics  
The proposed solution uses a soft-token based approach for user authentication on top of the SSL/TLS's security features.  ...  In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of SSL/TLS-enabled web applications, particularly when naive users want to connect to an  ...  We reviewed the existing approaches for user authentication and proposed a soft-token based user authentication.  ... 
doi:10.1016/j.aci.2014.02.001 fatcat:rwiiryqodzd4vd7il6c2qelt5q

Implementation and Evaluation of Steganography Based Online Voting System

Lauretha Rura, Biju Issac, Manas Kumar Haldar
2016 International Journal of Electronic Government Research  
The voting system will also include password hashed-based scheme and threshold decryption scheme.  ...  We assume that the election server used and the election authorities are trustworthy.  ...  As another layer of security, the user's passwords will be cryptographically secured by applying password hashed-based scheme for the generation of salt value and hashed password.  ... 
doi:10.4018/ijegr.2016070105 fatcat:rwnattojaraixcedqicekguewe

Flexible and Scalable Public Key Security for SSH [chapter]

Yasir Ali, Sean Smith
2004 Lecture Notes in Computer Science  
Requiring extensive work or an SSL server at Bob's site is also not practical for many users.  ...  A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server.  ...  Exploring visual hashing [5] as an alternative way for a human user to authenticate complex data would also be interesting. - The solution should be adoptable in the near-term by small groups of users  ... 
doi:10.1007/978-3-540-25980-0_4 fatcat:yewbpaym2jhopavydwxdi4huom

Active Directory Attacks—Steps, Types, and Signatures

Basem Ibrahim Mokhtar, Anca D. Jurcut, Mahmoud Said ElSayed, Marianne A. Azer
2022 Electronics  
Due to the wide use and adoption of this service, it has become a target for many attackers. Active Directory attacks have evolved through years.  ...  The content designed in this paper may serve as a baseline for organizations implementing detection mechanisms for their Active Directory environments.  ...  These hashes are used to provide a single sign-on experience to users in order to avoid entering the password each time the user wants to access a resource [28] .  ... 
doi:10.3390/electronics11162629 fatcat:fqso6ugjrjfjldkjdcaihjptqu

A Password Manager that Doesn't Remember Passwords

Elizabeth Stobert, Robert Biddle
2014 Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14  
Versipass also facilitates safe password reuse by allowing users to use the same image cue for multiple accounts.  ...  Instead of remembering passwords, Versipass remembers image cues for graphical passwords. These cues help users to better remember their passwords and to more easily link passwords with accounts.  ...  ACKNOWLEDGMENTS We would like to thank the Government of Canada for support from NSERC ISSNet and the GRAND NCE, as well as support from an NSERC Canada Graduate Scholarship, and an NSERC Discovery Grant  ... 
doi:10.1145/2683467.2683471 dblp:conf/nspw/StobertB14 fatcat:up7iuifd6zefjnbeokurgc2lxy

Using Petri-Net for Modeling and Formal Verification of Crypto-security in Driverless Vehicles

2020 International Journal of Engineering and Advanced Technology  
This paper presents a cryptography based approach for enforcing security mechanisms in driverless vehicles, used in the banking sector for transporting valuable assets.  ...  The system design is parallel and distributed; hence it is formally analyzed using Petri-net modeling technique.  ...  This password is stored securely in the server's database and users can access only a hash-value computed over it (using MD5) and the actual password is not visible to users.  ... 
doi:10.35940/ijeat.c6457.029320 fatcat:hr4tsv4agbgvnpdhspwnpcrlju
« Previous Showing results 1 — 15 out of 1,778 results