منابع مشابه
Password Authentication Scheme with Secured Login Interface
This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his p...
متن کاملSecured Login for Gmail Using Pattern Classifier with Voice Recognition
----------------------------------------------------------------------------------------------------------------ABSTRACT Fractal detection and recognition is a unique process for identifying every human being. This concept is more effective interms of authentication into the service. This module permits us to response in building each and every image sets followed by the measure of similarity m...
متن کاملSOUL System: secure online USB login system
The SOUL System is a secure online authentication system involving a two-factor authentication scheme that uses a password and an ordinary hardware device as security token. The three main parts of the system include the website, the ordinary hardware device, and a trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party ...
متن کاملSecured remote health monitoring system
Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The real-time medical data collected using wearable medical sensors are transmitted to a diagnostic centre. The data generated from the sensors are aggregated at this centre and transmitte...
متن کاملProtected Login
Despite known problems with their security and ease-of-use, passwords will likely continue to be the main form of web authentication for the foreseeable future. We define a certain class of password-based authentication protocols and call them protected login. Protected login mechanisms present reasonable security in the face of real-world threat models. We find that some websites already emplo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Information Technology
سال: 2013
ISSN: 1815-7432
DOI: 10.3923/rjit.2013.462.467