A New Authentication Method by Using Sequence of User Interactions

Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Security
Format: PDF
In this technical world, authentication is very important to provide security to various applications. Now-a-days, major password stereotypes are used such as textual passwords, biometric scanning, tokens and cards. Textual passwords are commonly used by all. Encryption algorithms should follow to provide security. In biometric scanning, natural signature and cards or tokens are scanned. But some people are irritated about this type. Most of textual passwords are easily identified by person's interest like pet names, first school name. In this internet world, there is lot of tools available on online to hack easily.

Find By Topic