Абстрактный

Secure Internet-Banking with Visual Authentication Protocols

S.Saravana Kumar, R.Senthil Kumar, P.Venkatraman, M.Thamodharan, S.Vishnu Prashod

The major threat in authentication involved in the banking sector is key logging. Key logging refers to monitoring the action of user without their knowledge and illegally accessing it for their own purpose. It can be done either through hardware, software and acoustic analysis. key logging, an approach to counter key logging by the use of authentication protocols which have not provided desired security. Thus, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше