Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
DOI
Warianty tytułu
Konferencja
The Second International Conference on Research in Intelligent and Computing in Engineering
Języki publikacji
Abstrakty
Nowadays online communication is increasing rapidly, password is provided as a key for communication henceforth there is a strong need to authenticate the online communication. But currently security breach occurs by stealing the password files through various ways of cyber attacks. Different technologies are available to safeguard password. The purpose of this paper is to evaluate various techniques for protection of password like graphical password, text password enhanced by Honeyword, Jumbling and salting approach.
Słowa kluczowe
Rocznik
Tom
Strony
279--282
Opis fizyczny
Bibliogr. 8 poz., rys., tab.
Twórcy
autor
- Department of Information Technology, PCCOE, Pune, India
autor
- Department of Information Technology, PCCOE, Pune, India
Bibliografia
- 1. Manisha Jagannath Bhole, “ Honeywords: A New Approach For Enhancing Security,” International Research Journal of Engineering and Technology (IRJET) , Volume: 02 Issue: 08 | Nov-2015J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
- 2. Prathamesh P. Churi, Vaishali Ghate, Kranti Ghag “Jumbling- Salting: An Improvised Approach for Password Encryption”; International Conference on Science and Technology 2015, RMUTT.
- 3. Seema Kharod, Nidhi Sharma, Alok Sharma ,”An Improved Hashing Based Password Security Scheme Using Salting and Differential Masking”, 978-1-4673-7231-2/15/$31.00 ©2015 IEEE.
- 4. Vikas K. Kolekar, Milindkumar B. Vaidya,” Click and Session Based—Captcha as Graphic Password Authentication Schemes for Smart Phone and Web” 2015 International Conference on Information Processing (ICIP) Vishwakarma Institute of Technology. Dec 16-19, 2015
- 5. A. Juels and R. L. Rivest, “Honeywords: Making Passwordcracking Detectable,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13. New York, NY, USA: ACM, 2013, pp. 145–160. [Online]. Available: http://doi.acm.org/10.1145/2508859.2516671.
- 6. Imran Erguler, “Achieving Flatness: Selecting the Honeywords from Existing User Passwords”, IEEE Transactions on Dependable and Secure Computing, Vol. 13, No. 2, March/April 2016
- 7. Nilesh Chakraborty, Samrat Mondal,“Towards Improving Storage Cost and Security Features of Honeyword Based Approaches”, 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India
- 8. Prathamesh P. Churi, Medha Kalekar, Bhavin Save “JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing”; International Journal of Computer Applications(0975 – 8887) Volume 92 – No.2, April 2014
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-dfd90adf-66df-4bf2-ad70-5407ecd122d3