Soumettre la recherche
Mettre en ligne
IRJET- Authentication System in Social Networks
•
0 j'aime
•
23 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V6/i3/IRJET-V6I3370.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 7
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
2020 cyber threat forcast.
2020 cyber threat forcast.
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
20120140504023
20120140504023
IAEME Publication
HinDroid
HinDroid
HinDroid
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
Recommandé
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
2020 cyber threat forcast.
2020 cyber threat forcast.
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
20120140504023
20120140504023
IAEME Publication
HinDroid
HinDroid
HinDroid
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
Security News bytes October 2013
Security News bytes October 2013
n|u - The Open Security Community
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET Journal
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
EMC
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
Why Passwords are not strong enough
Why Passwords are not strong enough
EMC
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Internet of Things, Examples and Issues
Internet of Things, Examples and Issues
IRJET Journal
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Davide Cioccia
IRJET- Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
IRJET Journal
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Carlos Laorden
321
321
Andrey Apuhtin
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
Journal For Research
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Eswar Publications
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
iosrjce
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET Journal
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Contenu connexe
Tendances
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
Security News bytes October 2013
Security News bytes October 2013
n|u - The Open Security Community
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET Journal
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
EMC
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
Why Passwords are not strong enough
Why Passwords are not strong enough
EMC
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Internet of Things, Examples and Issues
Internet of Things, Examples and Issues
IRJET Journal
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Davide Cioccia
IRJET- Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
IRJET Journal
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Carlos Laorden
321
321
Andrey Apuhtin
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
Journal For Research
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Eswar Publications
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
iosrjce
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET Journal
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
Tendances
(20)
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
Security News bytes October 2013
Security News bytes October 2013
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Why Passwords are not strong enough
Why Passwords are not strong enough
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
Internet of Things, Examples and Issues
Internet of Things, Examples and Issues
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
IRJET- Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
321
321
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
Similaire à IRJET- Authentication System in Social Networks
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
IRJET - Application for Public Issues
IRJET - Application for Public Issues
IRJET Journal
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
IRJET Journal
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
IRJET Journal
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET Journal
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET Journal
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- End to End Message Encryption using Biometrics
IRJET- End to End Message Encryption using Biometrics
IRJET Journal
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET Journal
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET Journal
Similaire à IRJET- Authentication System in Social Networks
(20)
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET - Application for Public Issues
IRJET - Application for Public Issues
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- End to End Message Encryption using Biometrics
IRJET- End to End Message Encryption using Biometrics
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
Sneha Padhiar
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
Sneha Padhiar
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
ChristianCDAM
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
Researcher Researcher
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
Stephen Sitton
Main Memory Management in Operating System
Main Memory Management in Operating System
Rashmi Bhat
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
BalamuruganV28
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Erbil Polytechnic University
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
Sneha Padhiar
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
Erbil Polytechnic University
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Romil Mishra
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
mohitesoham12
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
HafizMudaserAhmad
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
rnrncn29
OOP concepts -in-Python programming language
OOP concepts -in-Python programming language
SmritiSharma901052
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
BootNeck1
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
alene1
Dernier
(20)
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
Main Memory Management in Operating System
Main Memory Management in Operating System
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
Earthing details of Electrical Substation
Earthing details of Electrical Substation
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
OOP concepts -in-Python programming language
OOP concepts -in-Python programming language
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
IRJET- Authentication System in Social Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1935 AUTHENTICATION SYSTEM IN SOCIAL NETWORKS A.R Preethi1, M.Gayathri2, P.Jayasri3, J.Jenny Sarah4 1Assistant Professor, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu 2,3,4UG Student, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Secure Authentication is very important in today’s digital world, Mobile devices use sophisticated applications that makes life easier and more relax and convenient for users. Such applications, may involve mobile ticketing, identification, access control operations, etc., are often accessible through social network aggregators. Mobiles are the database for any person’s personal information. Therefore it turns as an attractive target for the spyware injections. Such malware software’s can steal the user’s credentials and valuable information’s from their accounts, perform unauthorized mobile access to social networkservices without the user’s consent. The main aim of this project is to propose the smart way authentication by using a unique logic on authentication and by using screen brightness of android mobiles in order to avoid various types of attacks. We compare BrightPass with existing schemes, in order to show its usability and security within the social network arena. Furthermore, we empirically assess the security of BrightPass through experimentation. Our tests indicate that BrightPass protects the PIN code against automatic submissions carried out by malware while granting fast authentication phases and reduced error rates. Key Words: Authentication, Mobiles, Social networks, Malware attacks, Brightpass scheme 1. INTRODUCTION Social networks are one of the most important communication platforms of the last 15 years with high socio-economic value. Social networks are an inherent part of today’s internet and used by more than a billion people worldwide. Over the last few years mobile communication devices have becoming powerful andtodaymany ofthemsupportapplicationbeing installedand executed on the device. Mobile devices use sophisticated applications that make life easier and more relax and convenient for users. Because of this people expect these social networking servicestobeavailableon theirmobiledevices.Itallowsexchange of user-generated content like data, pictures, and videos. Unfortunately, as the importance of these platform rises,theinterest of the hackers on them increases well, so that theft of user informationandauthenticationbreaches, become problemsinsocial networking area. Many attacks are successful in accessing social networks accounts and the authentication mechanism is not efficient and vulnerable to automated attacks. Many of the top most social networking services providers such as google, facebook, yahoo, twitter, snapchat and dropbox already allow you to optionally require second authentication.Unfortunately, the mobile devices used for gaining access are often vulnerable to several kind of malware. Mobile malware is a malicious software that is specifically built to attack mobile phone or smartphone system. This is kind of malware can be abletoretrieve all type of user information such as passwords and PIN codes which are used for perform authentication in social networking applications.Hence,the presence of malwareinmobiledevicesreducesimpactonsocial networks.Toovercome malwareattack numerous authentication methods are discovered. But those processes are takes long authentication time, having high error rates so they are low acceptance among the users. In this paper we discuss about BrightPass which enhancing the security and protection it is the simplest effective technique consist of two screen captures when brightness is high have to enter correct pin digit and when brightnessislowhavetoenter the fake one. Compare with existing techniquesBrightPassincreasesuserconfidenceandcreategreatimpactonsocial network access. It provides high security for mobile and sensitive applications against different types of malware attack. 2. RELATED WORK Nowadays smart phones are built using mobile operating system that allows them to run application with rich and modern functionality. This type of smart phone are designed with newcommunicationinterfacetocarryoutsecuritycritical operations which can access personal data in application using alpha numeric password.Thissystemleadstospreadacrossonlinemarket places and fool the user. This approach helps in preventing the spyware stealing the user credential. Yi.et.al. proposed a Pass Window which uses PIN digits and pre -selected image called pass icon. Chow et al. introduce idea of showing special CAPTHCA into a clickable CAPTHCA. These frameworks do not depend on console input the client is requested to choose few component in the network that match the test case.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1936 Fig-1:ReCAPTCHA Fig -2: Clickable CAPTCHA Fig -3: Drawing CAPTCHA Fig -4: AccCAPTCHA Kim et al. proposed a Password authentication scheme based ondummy-keycalledFakePIN whichconsistsofalpha numeric text and password as a secret value. Asirra that displays 12 images of butterflies and asks users to select all cat images among them. Shirali-Shahreza et al. proposed CAPTCHA mechanism for mobile phones called drawing CAPTCHA. In this method dot are displayed on the screen.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1937 Liao et al. proposed a new CAPTCHA scheme based on game logic and human recognition. Here the user as to play a rolling ball game to pass the CAPTCHA challenges. 3. THE BRIGHTPASS CONCEPT This approach contains a right PIN Number in a 6 digit format which is stored in a larger way. The request of PIN digitposition created by SE and further imparted to the client exchanging circle’s splendour esteems is high client must enter the right PIN digit whether it looks dim client must enter the deceptive lie PIN digit. This method is used by user and security elements to know the real pin digit with its positions. 3.1 REGISTRATION AND LOGIN The user creates an account and registers their password to provide user’s information such as phone number, e-maid id and location. If someone tries to access your account the server generates four digits PIN number for authenticating user account. The registered mobile no and e-mail id will get alert about your account in some cases 3.2 USER VALIDATION It is a new PIN-entry method. The basic layout of this method comprises a vertical array of digits from 0 to 9, juxtaposed with another array of ten familiar symbols such as + and / etc. These symbols are moveable in the vertical order usingup anddown buttons. At first, decide the symbol for the first digit of the PIN. After the first round when the symbol is decided, then in the consecutive rounds enter the second, third & fourth digit of the PIN. 3.3 IMPLEMENTING SCREEN BRIGHTNESS FOR AUTHENTICATION Spyware attack will be avoided by proposing the idea that uses the screen brightness as an authentication tool. For authentication the server generates the 6 digit binary value. Based on thebinarydigit thebrightnessofthescreengetschanged to high or low. If the screen brightness is high the user should input the correct PIN digit. Else the user should give the wrong or random PIN number. This proposed work will remove the digits which inserted while the screen brightness is low and takes the digit which is inserted when the screen brightness is high authentication. The server get the signature of user generated PIN and generate the signature value for the Original PIN and compares both the signatures. If the Signatures are equal the user can access their Profile. If not user access their profile. 3.4 SHARING INFORMATION Social network is an online platform which helps the people to share personal orcareer information.Thesesocial networksare distributed across many platforms Fig- 8, 9, 10, 11, 12, 13: Screen Captured For All Rounds during Authentication Fig -8
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1938 Fig -9 Fig -10 Fig -11 Fig-12
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1939 Fig -13 for linking and organizing people to share knowledge and information. Generally, in social network site peoplecansharetheir ideas, digital photos, and videos, posts to inform others about real world activities. 4. OVERALL CONCEPT 4.1 PIN-BASED MOBILE AUTHENTICATION METHOD FOR SENSITIVE OPERATIONS. The PIN-based mechanism to give security to versatile confirmation. For instance, consider a twitter account it's one of the informal organizations. The customer can prepare to get to the record before itself its need to outline the record with the objective that require a minute factor check by adding a phone numbertothetwitteraccountprofile. Whenwemarkedintothe twitter account and after enter the passageway mystery word, the customer asked for to enter a six-digit PIN number got by customer enlisted flexible number through text. Once entered the correct PIN number the customer can proficient access the twitter account. In any case, the spyware attempts to get to the portable to get the PIN number and attempttologin thisrecord without the client assertion. 4.2 BRIGHTNESS AS SECURITY MECHANISM Fig -13: Proposed Authentication Concept The Bright pass method is one of the screen capture and recording techniques which does not change the screen brightness (SB) setting into the smartphones. Using Bright pass mechanism captured the brightness level which is displayed on the smartphones and compare with visually. The versatile malware tries to get to portable OS and get screen splendour esteem. We utilized the Brightness of brilliant pass application without changing the framework's splendour esteems and store the esteem subtly in the protected components when the client cooperates with the application to enter the PIN. The Bright pass mechanism provides sufficient security against the attacks. 5. SECURITY ANALYSIS Here we use Bright pass mechanism against shoulder surfing attack, man-in middle attack, Brute force attacks, Dictionary attacks, spyware attack, side channel attack
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1940 5.1 SHOULDER SURFING ATTACK Shoulder surfing attack is one of the immediate perceptions strategies. For example, by using one shoulder to get data. It is used to get secret key, pin, security code of the individual. In Proposed System we use pin passage technique and joystick to select the symbol which is used as password in a secret manner. This will avoid shoulder surfing attack. 5.2 MAN-IN MIDDLE ATTACK Man-in middle attack is a conversation between 2 parties and both are accessing the Information and send to each others. In Proposed System we can avoid this attack, entering six-digit PIN numberbyuserandservergeneratessix-digit binarynumber. To prevent information’s from main-in middle attacks, Base64 and HMAC algorithms are used. This two algorithms provide encryption and signature values. Chart -1: Comparison with Existing System 5.3 BRUTE FORCE AND DICTIONARY ATTACK Both a brute force attack and dictionary attack are guessing attacks, they are not directly looking for a flaw or bypass. This attack either can be an online attack or offline attack. A Brute force attack is a secret key used to get client watchword. This method contains most of the basic word as secret key and check remaining word withall thepossibilitiesuntil itgetmatched.A Dictionary attack is a guessing attack which uses precompiled listofoptions.Ratherthantryingeveryoption,onlytrycomplete options which are likely to work. 5.4 SIDE CHANNEL ATTACK This system contains 2 elements to avoid side channel attack. One is the randomization of pin digit for authentication and second one use of screen brightness in secure way. Bright pass mechanism is divided into 2 categories of security 5.5 SPYWARE ATTACK It is the type of the malware attack install in our system without the knowledge of user. Spyware isusedtogettheinformation about the password, credit card, banking credential using internet. Spyware is mostly used to collect the information fromthe mobile in a secret way. This attack can be avoided by using Bright pass mechanism. 5.6 SMART PHONE THEFT Even though the smart phones are stolen by someone, it is impossible to access by them with the wrong password. The authentication is provided for all user account by verifying with the help of password. It provides security for all users by preserving and protecting the data from unauthorized person. 6. CONCLUSIONS In the modern era, the computerized world, including websites, applications, emails, and social networksbecamea significant part of our life. Due to the vast amount of information users publish on social networks, these platforms both aggregate and display a wealth of valuable information about users and their activity, that can be exploited by various hostile and malicious players.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1941 Therefore the proposed system uses a unique logic based and brightness based authentication mechanism capable of enhancing the security of identity confirmation PIN codes withouttheneedfortheuser torememberanadditional confidential value or to solve an arithmetic or visual cognitive task. This method introduces a new input value that is dynamic at every usage assigning a PIN with an interface element that cannot be capture by spyware. The security analysis shows that the proposed scheme is resilient against side channel attacks,Shouldersurfingattacks,Maninmiddleattacksandspywareattacks. From the experimental analysis this BrightPass mechanism offers low error rates in authentication part. Thus thistechnology creates a positive impact in the social networking environment. Finally, this mechanism can be extended for the secureonline transaction protected by PIN verification code. 7. REFERENCES [1] Meriem Guerar, Mauro Migliardi, Alessio Merio, Mohamed Benmohammed, Francesco Palmieri, and Aniello Castiglione, “Using Screen brightness to improve security in mobile social network access”Member, IEEE Transactionsondependableand secure computing, VOL. 15, NO. 4, JULY/AUGUST 2018 [2] Saranya, R., Gowri, S., Monisha, S., Vigneshwari, S., “An ontological approach for originating data services with hazy semantics”, Indian Journal of Science and Technology-0974-5645, Vol 9(23), June 2016/1-6 Scopus [3] T.Wang, Y.Chen, M.Zhang, Y.Chen, and H.Snoussi, “Internal transfer learning for improving performance in human action recognition for small datasets,” IEEE Access, vol.5, pp. 17627-17633. [4] M. Korakakis, E.Magkos and Ph.Mylonas, “Automated CPATCHA solving:AnEmpirical ComparisonofselectedTechniques”, 2014 9th International Workshop on semantic and social Media Adaptation and Personalisation.Doi:10.1109/SMAP.2014.29 [5] D.Pequegnot, L.Cart-lamy, A.Thomas, T.Tigeon, J.Iguchi-cartigny, Jean-Louis Lanet, “A Security Mechanism to Increase Confidence in M-Transaction”. [6] Sandipkumar M Vaniya, B. Bharathi, “Exploring object segmentation methods in visual surveillance for human activity recognition”, International Conference on Global Trends in Signal Processing,InformationComputingandCommunication,pp. 520-525, 2016. [7] Bandaru R, Albert Mayan J (2016), “Novel approach for whole test suite generation using metamorphic relations”, Indian Journal of Science and Technology, Vol 9, No.10, pp.1-7. [8] Vigneshwari. S and Aramudhan. M (2015), “Personalized cross ontological framework for secured document retrieval in the cloud”, National Academy Science Letters-India, Vol. 38 (5), pp. 421–424. [9] Kalpana, S., Vigneshwari, S, “Selecting multiview point similarity from different methods of similarity measureto perform document comparison”, Indian Journal of Science and Technology-0974-5645, Vol 9(10),March 2016/1-6. Scopus. [10] Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V: “Multi-digit number recognition from street view imagery using deep convolutional neural networks” ICLR (2014)
Télécharger maintenant