A Survey on Key logging-resistant Visual Authentication Protocol
Journal: International Journal for Research in Engineering Application & Management (Vol.03, No. 09)Publication Date: 2017-12-30
Authors : Ruksar Sayyad Shivkant Mishra;
Page : 05-08
Keywords : Graphical passwords; Social engineering; Distortion; Key logging; visual authentication protocols;
Abstract
The Keystroke logging, referred to as key logging or capturing the strokes of keyboard, is the act of recording which means logging the keys pressed on a keyboard, other way round it is, that the person using the keyboard is unknown about the fact that their actions are being observed. Key logging can also be used to study human–computer interaction. We have large number of key logging methods that range from hardware and software approaches to acoustic analysis. Here we have proposed two visual authentication protocols one is a one-time-password protocol, the other one is password-based authentication protocol. We verify that our protocols are much strong and can with stand to many of the challenging authentication attacks. Our main focus is to highlight the potential of our approach for real-world deployment: whether we can achieve a high level of usability with satisfactory and acceptable results
Other Latest Articles
- Methodology of modern marketing management pharmaceutical organizations
- CONCEPTUALIZATION OF THE CONCEPT INSTITUTE OF THE MARKET OF INSURANCE SERVICES BASED ON THE NEO-CLASSIC ECONOMY
- THE EFFECTIVENESS OF SEXUAL EDUCATION CONCENTRATED ON COGNITIVE SCHEMAS ON SEXUAL FUNCTIONING AND EMOTIONAL REGULATION IN WOMEN
- PROBLEMS OF INTEGRATION OF THE HIGH ORDER STRATEGY AT THE AFFILIATED COMPANY AT M&A
- LOCAL COMMUNITIES COOPERATION IN CROSS-BORDER AREA OF UKRAINE AND THE EU
Last modified: 2018-01-11 00:11:03