[PDF][PDF] H-rotation: secure storage and retrieval of passphrases on the authentication process

H Touil, N El Akkad, K Satori - Int. J. Saf. Secur. Eng, 2020 - academia.edu
Accepted: 3 December 2020 Passwords/passphrases can be either system generated or
user-selected. A combination of both approaches is also possible—encryption created by …

[PDF][PDF] Providing password security by salted password hashing using bcrypt algorithm

P Sriramya, RA Karthika - ARPN journal of engineering and applied …, 2015 - academia.edu
ABSTRACT World Wide Web has become a popular medium to search information,
business, trading and so on. Various organizations and companies are also employing the …

Rig: A Simple, Secure and Flexible Design for Password Hashing

D Chang, A Jati, S Mishra, SK Sanadhya - Information Security and …, 2015 - Springer
Password Hashing, a technique commonly implemented by a server to protect passwords of
clients, by performing a one-way transformation on the password, turning it into another …

Implementation of enhanced secure hash algorithm towards a secured web portal

FE De Guzman, BD Gerardo… - 2019 IEEE 4th …, 2019 - ieeexplore.ieee.org
In this paper, the application of the enhanced secure hash algorithm-512 is implemented on
web applications specifically in password hashing. In addition to the enhancement of hash …

[PDF][PDF] Detection of phishing websites and secure transactions

R Dhanalakshmi, C Prabhu, C Chellapan - … Journal Communication & …, 2011 - Citeseer
Phishing is an electronic online identity theft in which the attackers use a combination of
social engineering and web site spoofing techniques to trick a user into revealing …

Security and performance considerations of improved password authentication algorithm, based on OTP and hash-chains

I Chenchev, O Nakov, M Lazarova - Proceedings of the Future …, 2021 - Springer
The paper presents an approach for password authentication based on one-time password
and hash function that improves the security of the P2P authentication because no …

Secure authentication without using HTTPS

VY Filimoshin, LZ Davletkireeva - International Journal of Open Information …, 2017 - injoit.ru
The purpose of this article is to present a secure authentication algorithm for web resources
without using HTTPS. The main idea of the algorithm is to avoid transferring a password in …

An improved hashing based password security scheme using salting and differential masking

S Kharod, N Sharma, A Sharma - 2015 4th International …, 2015 - ieeexplore.ieee.org
In this era of digitization, the foremost requirement is information security which is normally
secured by some authentication process. Password security is a major issue for any …

Analysis of password login phishing based protocols for security improvements

SH Khayal, A Khan, N Bibi… - … Conference on Emerging …, 2009 - ieeexplore.ieee.org
Password is a key to secret authentication data and is most widely used for security
purposes therefore it is open to attacks such as phishing attack. Phishing is a form of Internet …

[PDF][PDF] Authentication and password storing improvement using SXR algorithm with a hash function

J Polpong, P Wuttidittachotti - International Journal of …, 2020 - pdfs.semanticscholar.org
Secure password storing is essential in systems working based on password authentication.
In this paper, SXR algorithm (Split, Exclusive OR, and Replace) was proposed to improve …