Author : Nichita Silva Lobo 1
Date of Publication :6th April 2017
Abstract: Textual are the most simple to use and implement. They are the most common method used for authentication but are also vulnerable to spyware key, loggers, eves dropping and dictionary attacks. To address this problem and make the system more secure this paper proposes three different levels of authentication namely textual passwords, pair-based password and graphical password. Combining all the three level this paper focuses on providing the user with stronger security and a user friendly interface.
Reference :
-
- Nagesh D. Kamble, J. Dharani "Implementation of Security System Using 3-Level Authentication" (IJEDR)(Volume 2, Issue 2,2014)
- M Sreelatha, M Shashi, M Anirudh, Md Sultan Ahamer, V Manoj Kumar, "Authentication schemes for Session Passwords using Color and Images", International Journal of network Security and Its Applications" (IJNSA),(volume 3, No.3, May 2011)
- Iran a a m, PankajaPatil, "Graphical Password Authentication using Persuasive Cues Click Point" International Journal of Advanced Research in Electrical, Electronics and Instrumental Engineering (Vol.2 Issue 7,July 2013)
- Kunal Mulwani, SaurabhNaik, Navin Kumar Guarnani, Dr. Nupur Giri, Prof. SharmilaSengupta, "3LAS(Three Level Authentication Scheme)" International Journal of Engineering Technology and Advanced Engineering ( ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013)