[go: up one dir, main page]

Selvan et al., 2013 - Google Patents

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Selvan et al., 2013

View PDF
Document ID
10388795441141437881
Author
Selvan K
Vanitha M
Publication year
Publication venue
International Journal of Science and Research

External Links

Snippet

The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Parmar et al. A comprehensive study on passwordless authentication
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
US7073067B2 (en) Authentication system and method based upon random partial digitized path recognition
Papaspirou et al. A novel two-factor honeytoken authentication mechanism
Al Rousan et al. A comparative analysis of biometrics types: literature review
Manzoor et al. Secure login using multi-tier authentication schemes in fog computing
Sethuraman et al. Metasecure: A passwordless authentication for the metaverse
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Boonkrong Methods and threats of authentication
AlRousan et al. Multi-factor authentication for e-government services using a smartphone application and biometric identity verification
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Vila et al. A professional view on ebanking authentication: Challenges and recommendations
Waheed et al. Secure login protocols: An analysis on modern attacks and solutions
van Oorschot User authentication—passwords, biometrics and alternatives
Kamau et al. A review of Two Factor Authentication Security Challenges in the Cyberspace
Mohammed et al. A new system for user authentication using Android application
Selvan et al. An Enhanced Countermeasure Technique for Deceptive Phishing Attack
Karunambikai Securing Net Banking Transactions: The Dynamic Duo of AI and Blockchain Technology
Le et al. A new pre-authentication protocol in Kerberos 5: Biometric authentication
Matei-Dimitrie Multi-factor authentication. An extended overview
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
CA2579826C (en) Authentication system and method based upon random partial digitized path recognition
Ahmad et al. Enhancing the Authentication Mechanism of Social Media Websites using Face Detection
Raja et al. Effective Method of Web Site Authentication Using Finger Print Verification