Selvan et al., 2013 - Google Patents
An Enhanced Countermeasure Technique for Deceptive Phishing AttackSelvan et al., 2013
View PDF- Document ID
- 10388795441141437881
- Author
- Selvan K
- Vanitha M
- Publication year
- Publication venue
- International Journal of Science and Research
External Links
Snippet
The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering …
- 238000000034 method 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parmar et al. | A comprehensive study on passwordless authentication | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
US7073067B2 (en) | Authentication system and method based upon random partial digitized path recognition | |
Papaspirou et al. | A novel two-factor honeytoken authentication mechanism | |
Al Rousan et al. | A comparative analysis of biometrics types: literature review | |
Manzoor et al. | Secure login using multi-tier authentication schemes in fog computing | |
Sethuraman et al. | Metasecure: A passwordless authentication for the metaverse | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Boonkrong | Methods and threats of authentication | |
AlRousan et al. | Multi-factor authentication for e-government services using a smartphone application and biometric identity verification | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Vila et al. | A professional view on ebanking authentication: Challenges and recommendations | |
Waheed et al. | Secure login protocols: An analysis on modern attacks and solutions | |
van Oorschot | User authentication—passwords, biometrics and alternatives | |
Kamau et al. | A review of Two Factor Authentication Security Challenges in the Cyberspace | |
Mohammed et al. | A new system for user authentication using Android application | |
Selvan et al. | An Enhanced Countermeasure Technique for Deceptive Phishing Attack | |
Karunambikai | Securing Net Banking Transactions: The Dynamic Duo of AI and Blockchain Technology | |
Le et al. | A new pre-authentication protocol in Kerberos 5: Biometric authentication | |
Matei-Dimitrie | Multi-factor authentication. An extended overview | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
CA2579826C (en) | Authentication system and method based upon random partial digitized path recognition | |
Ahmad et al. | Enhancing the Authentication Mechanism of Social Media Websites using Face Detection | |
Raja et al. | Effective Method of Web Site Authentication Using Finger Print Verification |