IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



AES Algorithm For Advanced Security In Online Banking

[Full Text]

 

AUTHOR(S)

R.Ganeshan, K.Giri Kumar Reddy, A.V.S Manikanta, P.V Sai Lasya

 

KEYWORDS

CaPRP, AI, Puzzle technology.

 

ABSTRACT

Security is most widely used in many applications. Many algorithms and approaches are used to find security issues identified in the various applications. In this paper, the new security primitive which is based on tedious AI problems such as graphical password systems developed by using Puzzle technology, which is called as Puzzle graphical passwords (CaPRP). This is the combination of puzzle and a graphical password scheme. This will predict the attacks and analyze the various predictions and prevent the attacks from the various attacks. The proposed system also finds the image hotspot problem which is most popular in graphical password systems, such as Pass Points that often leads to weak password choices. The proposed System shows the performance.

 

REFERENCES

[1] A. Adams and M. Sasse, “Users are not the enemy,” Commun. ACM, vol. 42, pp. 40–46, 1999.
[2] M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, “How to attack twofactor authentication internet banking,” in Proc. 17th Int. Conf. Financial Cryptography, 2013, pp. 322–328.
[3] ARTigo, http://www.artigo.org/.
[4] F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644.
[5] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learningfrom the first twelve years,” ACM Comput. Surveys vol. 44, no. 4, p. 19, 2012.
[6] G. E. Blonder, “Graphical passwords,” U.S. Patent 5 559 961, 1996.
[7] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” in Proc. IEEE Symp. Security Privacy, 2012, pp. 553–567.
[8] S.Chiasson, R. Biddle, and P. van Oorschot, “Asecond look at the usability of click-based graphical passwords,” in Proc. 3rd Symp. Usable Privacy Security, 2007, pp. 1–12.
[9] S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical password authentication using cued click points,” in Proc. 12th Eur. Symp. Res. Comput. Security, 2007, pp. 359–374.