期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:3
DOI:10.15680/ijircce.2015.0303085
出版社:S&S Publications
摘要:The major threat in authentication involved in the banking sector is key logging. Key logging refers tomonitoring the action of user without their knowledge and illegally accessing it for their own purpose. It can be doneeither through hardware, software and acoustic analysis. key logging, an approach to counter key logging by the use ofauthentication protocols which have not provided desired security. Thus, we propose two visual authenticationprotocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Ourapproach for real-world deployment: we were able to achieve a high level of usability while satisfying stringentsecurity requirements.