CCT: An Efficient and Affordable User Authentication Protocol Defiant to Password Pinching and Reclaiming

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Due to its convenience and ease of text secret code user verification is the most popular form of websites. Users secret codes are stolen under a variety of threats and vulnerabilities are not compromised. First, users often choose weak secret codes and using secret codes across multiple websites again. Second, the threat of rogue thief suffers secret code, type the system secret code. Reusing a secret code, stealing a secret code to a user's cell phone and SMS service exists to thwart attacks, Cryptographic Cipher Text (CCT) verification protocol design for a user name in which the cipher text is encoded and decoded by using hash function.
Download Now

Find By Topic