Entropy based performance comparison of cryptographic algorithms on emoticons

SB Munnoli, SL Deshpande - 2017 International Conference On …, 2017 - ieeexplore.ieee.org
Securing password files has become a major issue these days. The password files are
being hacked and the intruders are impersonating and tampering with the data. Therefore …

Achieving flatness from non-realistic honeywords

K Akshaya, S Dhanabal - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
We propose a method for protecting the hashed password using non-realistic honeywords
(decoy passwords). This method works effectively even if the password file disclosure …

Detection and avoidance of attacker using honey words in purchase portal

PB Shamini, E Dhivya, S Jayasree… - 2017 Third …, 2017 - ieeexplore.ieee.org
Passwords that are used over the Internet provides less security to the customers. There are
millions of security problem that affects the users. As the hacker affects the whole system by …

[PDF][PDF] Virtual Environments Provide Mammoth Security for Critical Server

RN Muneshwar, SK Sonkar - International Journal of Engineering and Advanced … - Citeseer
Security is the key factor of resolution of computer era. In every field of computer it may be
cloud computing, neural network, data ware house, data mining, or grid computing in every …

Analysis of Authentication on Online Purchase Using Honey Password

B Sudramurthy, M Al Obaidy… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This research study is intended to solve the security threats of using passwords in
purchasing products online. After thorough study, the researchers found out that there is a …

Rat trap: inviting, detection & identification of attacker using honey words in purchase portal

A Karthik, MD Kamalesh - 2017 Third International Conference …, 2017 - ieeexplore.ieee.org
In today's Internet world the authentication of data plays efficient way in the security of data.
Nowadays online purchase is done by customers for easy access and delivery of product on …

[PDF][PDF] Generating Honeywords from Real Passwords with Decoy Mechanism

MK Naik, V Bhosale, VD Shinde - International Journal for Research …, 2016 - academia.edu
As society and business is more dependent on digital data, the threat continues to rapidly
increase. Every year new mechanism against cyber security threats are introduced. But …

Strengthening password security through honeyword and Honeyencryption technique

VR Pagar, RG Pise - … Conference on Trends in Electronics and …, 2017 - ieeexplore.ieee.org
In digital era people's livelihood is completely depend on internet due to speedy growth of it.
Web services are widely used by business, government, individuals. Communication with …

Secure user authentication using honeywords

S Palaniappan, V Parthipan… - Proceeding of the …, 2020 - Springer
The purpose of the password is to protect the user account from unauthorized usage by the
hacker. But in the current situation the field of security also realizes lot of threat to the …

[PDF][PDF] An Efficient Privacy Preserving Technique Using Decoy Passwords

GSV Bhanu, VS Naresh - International Journal of Scientific …, 2017 - researchgate.net
As per the rapid growth and essentiality in the field of information security, the data
authentication and data access control are the major concerns. Now-a-days many users …