منابع مشابه
Virtualization Based Password Protection against Malware in Untrusted Operating Systems
Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...
متن کاملProver and Verifier Based Password Protection: PVBPP
In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate ...
متن کاملStudy on Protection Against Password Phishing
Phishing attack is new type of network attach and become a major nuisance on the internet. The rapidly progressof phishing attacksthe present secure socket layer is not able to provide and protect users from fraudulent websites. The attacks have been targeted the non-cryptographic security protocols likeTransport layer security and secure socket layerprotocols. These protocols are not sufficien...
متن کاملLAPPS: Location Aware Password Protection System
This report describes the design and the implementation of a password protection system that has been proposed as an idea then developed by the author for his undergraduate final year project, at the University of Essex. When designing the system the author has concentrated on adding extra layers of security to the traditional security systems without having to completely replace the existing s...
متن کاملIT Security Protection at Field Level of Industrial Automation Systems
Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field buses or field devices. Due to resource limitations, existing protective mechanisms can not be deployed to the embedded systems of which the field level is composed. In this contribution, threats against distributed embed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Military University of Technology
سال: 2018
ISSN: 1234-5865
DOI: 10.5604/01.3001.0011.8036