SuperSec Protocol

Download Now
Provided by: International journal of Engineering and Management Research (IJEMR)
Topic: Security
Format: PDF
The most popular form of user authentication is the text password, which are the most convenient and the simplest. Users mostly choose weak passwords and reuse the same password across different websites and thus, a domino effect. i.e., when an adversary compromises one password, the user exploits gaining access to more websites. Also typing passwords into public computers (kiosks) suffers password thief threats; thereby the adversary can launch several password stealing attacks, such as phishing, key loggers and malware.
Download Now

Find By Topic