Web Based Security using Online Password Authentication in Mobile Application
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

The internet has one of the most convenient and widely used media for people for exchanging information and to do business over the internet. E.g. Accessing web based emails, online auction or banking sites. But now a days accessing the internet is faced with many challenges. One of the most popular challenges is to ensure security with vital role to provide security in websites. Text password is a convenient and simplest form for a user authentication on websites, and it is level to security attacks. User mostly used weak password and it is often used across several websites and reuse password by typing into untrusted websites causes password threats. Hackers launch password stealing methods to grab password such as phishing, malware, and key loggers. The proposed system is a user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It uses three phases as registration, login and recovery phase. Here random password is generated for each login. Registration is used to register the user. Recovery phase is used, if the users mobile phone gets lost. The user needs remember only his long term password which has been stored in database very secretly and securely.

Keywords: Network security, User authentication, Long Term Password, One Time Password, LOPass

Edition: Volume 2 Issue 7, July 2013

Pages: 74 - 77

Share this Article

How to Cite this Article?

A. T. Bhole, Sheetal Chaudhari, "Web Based Security using Online Password Authentication in Mobile Application", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=0201393, Volume 2 Issue 7, July 2013, 74 - 77

89 PDF Views | 80 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Similar Articles with Keyword 'User authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1733 - 1735

Common Gateway Interface

Kamal Kathuria, Chaynika Kapoor, Apoorva Adlakha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1298 - 1302

A Novel Approach for Palm Print Recognition Using Minutiae Points with BFOA

Ridhima Prothia, Jatinder Kumar

Share this Article

Similar Articles with Keyword 'Long Term Password'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 74 - 77

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

Share this Article

Similar Articles with Keyword 'One Time Password'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 574 - 579

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

Avanti H. Vaidya, S. W. Mohod

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2465 - 2468

E-Voting Using Face Detection and Recognition (FDR), One Time Password (OTP)

Vahbiz Pardiwalla, Danista. S. Shaikh, Pooja Bhosale, Prof. J. R. Pansare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 482 - 486

Security and Storage Management of Data on Cloud using Fully Homomorphic Encryption and Adaptive Compression Approach

Bikramjeet Singh Bumrah, Gurbind Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article
Top