A Survey on Existing Password Storage Methods and their Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 119 , Downloads: 99 | CTR: 83 %

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Each user need accounts to access service for website. Any account authentication or identification password is required, but most of the user choose easily remembered password which give low security protection. Some user keeps same password for all accounts. Proposed system pendrive is used to store more number of password with high security. In this paper, there are few methods to store password securely.

Keywords: Password, Pendrive, Password Protection, Security

Edition: Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

Share this Article

How to Cite this Article?

Samruddhi Patil, Kumud Wasnik, "A Survey on Existing Password Storage Methods and their Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172807, Volume 6 Issue 4, April 2017, 1760 - 1762

119 PDF Views | 99 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Password'

Views: 126 , Downloads: 88 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 119 , Downloads: 99 | CTR: 83 %

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Views: 142 , Downloads: 101 | CTR: 71 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Similar Articles with Keyword 'Password Protection'

Views: 119 , Downloads: 99 | CTR: 83 %

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Views: 119 , Downloads: 110 | CTR: 92 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1999 - 2004

Multi-Biometric Cryptographic Security System with Dynamic Password Protection

Vaibhavkumar Suprao Gaikawad, S. N. Kini

Share this Article

Similar Articles with Keyword 'Security'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 163 , Downloads: 40 | CTR: 25 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article
Top