password based authentication and prevention of dictionary attack
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
rohithbs
Active In SP
**

Posts: 2
Joined: Feb 2010
#1
09-02-2010, 03:23 PM


can you please send ppt representation and report of the topic mentioned above
Reply
project report tiger
Active In SP
**

Posts: 1,062
Joined: Feb 2010
#2
09-02-2010, 03:36 PM

abstract:
Password-based authentication is susceptible to attack is used on insecure communication channels like the Internet. Researchers have engineered several protocols to prevent attacks, but we still nee formal models to analyze and aid in the effective design of acceptable password protocols geared to prevent dictionary attacks. The most common verification technique is to check whether the claimant possesses information or characteristics that a genuine entity should possess. For example, we can authenticate a phone call by recognizing a person™s voice and identify people we know by recognizing their appearance. But the authentication process can get complicated when visual or auditory clues aren™t available to help with identification”for example, when a print spooler tries to authenticate a printer over the network, or a computer tries to authenticate a human user logging in. A computer can authenticate humans through ¢ biometric devices such as retinal scanners, fingerprint analyzers, and voice-recognition systems that authenticate who the user is; ¢ passwords that authenticate what the user knows; ¢ and smart cards and physical keys that authenticate what the user has.


please read
cs.uky.edu/~singhal/SINGHAL.pdf
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.131.1034&rep=rep1&type=pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  graphical password authentication source code download in swing Guest 1 131 31-10-2016, 02:39 PM
Last Post: amrutha735
  java code to implement salami attack Guest 1 74 31-10-2016, 02:30 PM
Last Post: jaseela123
  graphical password authentication source code download in swing Guest 1 56 31-10-2016, 12:52 PM
Last Post: amrutha735
  plc based automatic bottle filling and capping system ppt Guest 1 76 31-10-2016, 10:25 AM
Last Post: jaseela123
  complete project report on password based circuit breaker using eeprom Guest 1 53 31-10-2016, 10:00 AM
Last Post: anusree
  show me the literature survey of 3d password Guest 1 89 31-10-2016, 09:42 AM
Last Post: jaseela123
  ns2 source cpdo for ddos attack in tcl script Guest 1 52 29-10-2016, 03:32 PM
Last Post: Dhanabhagya
  graphical password authentication source code download in swing Guest 1 125 29-10-2016, 03:17 PM
Last Post: amrutha735
  data dictionary for online voting system Guest 1 76 29-10-2016, 02:58 PM
Last Post: Dhanabhagya
  graphical password authentication source code download in swing Guest 1 57 29-10-2016, 12:30 PM
Last Post: ijasti