The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking, monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the u...
A literature review was done to find that there are still issues with writing passwords. From the in...
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authenticatio...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Abstract—Keylogging is an activity of capturing users’ keyboard strokes and records the activity of ...
Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a compute...
[[abstract]]User authentication is one of the fundamental procedures to ensure secure communications...
With the establishment of the information society, security had become the greatest concern for Inst...
Keylogging or keyboard capturing is the activity of recording (or logging) the keys struck on a keyb...
Abstract--In online services security is most important factor. In this paper we design QRP, a secur...
As a fast web framework is being created and individuals are informationized, even the budgetary und...
As we know, number of Internet users are increasing drastically. Now, people are using different onl...
QR codes are widely used in various settings such as consumer advertising, commercial tracking, tick...
Abstract: It is important to differentiate between various objects and places in the real world. Any...
The way to achieve secure communication is to have authentication protocol, which is a type of cryp...
The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code e...
A literature review was done to find that there are still issues with writing passwords. From the in...
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authenticatio...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Abstract—Keylogging is an activity of capturing users’ keyboard strokes and records the activity of ...
Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a compute...
[[abstract]]User authentication is one of the fundamental procedures to ensure secure communications...
With the establishment of the information society, security had become the greatest concern for Inst...
Keylogging or keyboard capturing is the activity of recording (or logging) the keys struck on a keyb...
Abstract--In online services security is most important factor. In this paper we design QRP, a secur...
As a fast web framework is being created and individuals are informationized, even the budgetary und...
As we know, number of Internet users are increasing drastically. Now, people are using different onl...
QR codes are widely used in various settings such as consumer advertising, commercial tracking, tick...
Abstract: It is important to differentiate between various objects and places in the real world. Any...
The way to achieve secure communication is to have authentication protocol, which is a type of cryp...
The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code e...
A literature review was done to find that there are still issues with writing passwords. From the in...
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authenticatio...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...