Views: 119 , Downloads: 99 | CTR: 83 %
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017
A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Each user need accounts to access service for website. Any account authentication or identification password is required, but most of the user choose easily remembered password which give low security protection. Some user keeps same password for all accounts. Proposed system pendrive is used to store more number of password with high security. In this paper, there are few methods to store password securely.
Keywords: Password, Pendrive, Password Protection, Security
Edition: Volume 6 Issue 4, April 2017
Pages: 1760 - 1762
How to Cite this Article?
Samruddhi Patil, Kumud Wasnik, "A Survey on Existing Password Storage Methods and their Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172807, Volume 6 Issue 4, April 2017, 1760 - 1762
119 PDF Views | 99 PDF Downloads
Similar Articles with Keyword 'Password'
Views: 126 , Downloads: 88 | CTR: 70 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2067 - 2068An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan
Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Views: 119 , Downloads: 99 | CTR: 83 %
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Views: 142 , Downloads: 101 | CTR: 71 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Similar Articles with Keyword 'Password Protection'
Views: 119 , Downloads: 99 | CTR: 83 %
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Views: 119 , Downloads: 110 | CTR: 92 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1999 - 2004Multi-Biometric Cryptographic Security System with Dynamic Password Protection
Vaibhavkumar Suprao Gaikawad, S. N. Kini
Similar Articles with Keyword 'Security'
Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 47 , Downloads: 40 | CTR: 85 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Views: 163 , Downloads: 40 | CTR: 25 %
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S