We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications

by B. Shanmuga Sundari, G. Anusooya Devi, S. Shahina
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 2
Year of Publication: 2013
Authors: B. Shanmuga Sundari, G. Anusooya Devi, S. Shahina
10.5120/13085-0341

B. Shanmuga Sundari, G. Anusooya Devi, S. Shahina . Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications. International Journal of Computer Applications. 75, 2 ( August 2013), 42-46. DOI=10.5120/13085-0341

@article{ 10.5120/13085-0341,
author = { B. Shanmuga Sundari, G. Anusooya Devi, S. Shahina },
title = { Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 2 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number2/13085-0341/ },
doi = { 10.5120/13085-0341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:13.058702+05:30
%A B. Shanmuga Sundari
%A G. Anusooya Devi
%A S. Shahina
%T Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 2
%P 42-46
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is the first line of defense against compromising confidentiality and integrity Traditional login password may not be used in every scenario its occurred lots of attacks. As an alternative PAST were introduced. In this paper introduce a framework of our proposed in two different verification code system were introduced.

References
  1. Roberto Di Pietro, Gianluigi Me, Maurizio A. Strangio . A Two –Factor Mobile Authentication Scheme for Secure Financial Transactions. International Conference on Mobile Business 2005.
  2. Harris, J. A. A One Time Password Scheme . International conference on Parallel Processing Workshops, 2002 . Proceedings.
  3. Clickatell SMS Gateway developers API available at http://www. clickatell. com/developers/api_http. php [4 ] FIPS 180-1 announcing standards for secured hash algorithm available from http://www. itl. nist. gov/fipspubs/fip180-1. html
  4. B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 2nd Edition, 1995.
  5. Michael Pearce, Ray Hunt, Sherali Zeadally. Assessing and Improving Authentication Confidence Management, University of Canterbury, New Zealand and University of the District of Columbia.
  6. Suzumura T, Trent S, Tatsubori M, Tozawa A, Onodera T. Performance comparison of Web Service Engines in PHP, Java and C,IEEE International Conference on Web Services 2008.
  7. George Schlossnagle, Advanced PHP programming.
  8. Naphtali Rishe, Khaled Naboulsi, Ouri Wolfson, Bryon Ehlmann. An Efficient Web-based Semantic SQL Query Generator . High Performance Database Research Center, Florida International University.
  9. Muhammad Saleem, Kyung-Goo Doh. Generic Information System Using SMS Gateway. Fourth International Conference on Computer Sciences and Convergence Information Technology 2009
  10. A. medrano,Online Banking Security-Layers of protection available at http://ezinearticles. com/?Online-Banking-Security---Layers-of-Protection&id=1353184
  11. Do van Thanh Jorstad, I. Jonvik, and T. Do Van Thuan. Strong Authentication with Mobile Phone as Security Token, Mobile Adhoc and Sensor Systems, 2009. IEEE 6th International Conference
  12. Aloul F, Zahidi S, El-Hajj W. Two Factor Authentication Using Mobile Phones, IEEE/ACS International Conference on Computer Systems and Applications
  13. D. Ilett, ?US Bank Gives Two-Factor Authentication to Millions of Customers?, 2005. Available at http://www. silicon. com/financialservices/0,3800010322,39153981,00. html
  14. Yu Tao Fan, Gui ping Su. Design of Two-Way One -Time-Password Authentication Scheme Based On True Random Numbers. Second International Workshop on Computer Science and Engineering 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Password Authentication System in Two ways communication