Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

An effective password protection technique using decoy passwords

An effective password protection technique using decoy passwordsvon Srinivasa Naresh Vankamamidi Sie sparen 16% des UVP sparen 16%
Über An effective password protection technique using decoy passwords

As per the growth in the field of security, data authentication and data access control are the major issues. Now-a-days many users prefer to share their data through websites are bound to have many security related issues. The main issue is the leakage of password file. To overcome this issue, honey words concept is introduced. Honey words are the Decoy (fake) passwords. If an attacker steals the password file, it will include original password and honey words and password cracking becomes tougher. So, for an adversary it will become harder to distinguish between original password and a honey word. The administrator gets notification if any illegal login done apart from the genuine user. In this system the main advantage is that sensitive data can¿t be viewed by the unauthorized user. For this Identity Based Encryption (IBE) has been implemented. By this, only the user with genuine credentials allowed to view the original data.

Mehr anzeigen
  • Sprache:
  • Englisch
  • ISBN:
  • 9786206791829
  • Einband:
  • Taschenbuch
  • Seitenzahl:
  • 60
  • Veröffentlicht:
  • 23. Oktober 2023
  • Abmessungen:
  • 150x4x220 mm.
  • Gewicht:
  • 107 g.
  Versandkostenfrei
  Versandfertig in 1-2 Wochen.

Beschreibung von An effective password protection technique using decoy passwords

As per the growth in the field of security, data authentication and data access control are the major issues. Now-a-days many users prefer to share their data through websites are bound to have many security related issues. The main issue is the leakage of password file. To overcome this issue, honey words concept is introduced. Honey words are the Decoy (fake) passwords. If an attacker steals the password file, it will include original password and honey words and password cracking becomes tougher. So, for an adversary it will become harder to distinguish between original password and a honey word. The administrator gets notification if any illegal login done apart from the genuine user. In this system the main advantage is that sensitive data can¿t be viewed by the unauthorized user. For this Identity Based Encryption (IBE) has been implemented. By this, only the user with genuine credentials allowed to view the original data.

Kund*innenbewertungen von An effective password protection technique using decoy passwords



Ähnliche Bücher finden
Das Buch An effective password protection technique using decoy passwords ist in den folgenden Kategorien erhältlich:

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.