Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013
Challenges in Password Memorization for Multiple Accounts of Single User
Pratik Ranjan, Nachiketa Tarasia
Passwords are the most common way to authenticate the users and allow access to the system or any application. User Id and password plays vital role in any authentication based application. Numbers of online accounts are increasing with increase in services over internet that results increase in passwords as well. Ultimately it is upon users who need to remember their all passwords to access the online accounts. This paper is to deal with the problem related to remembering of passwords for any human being and how to overcome in near future.
Keywords: Authentication, Password, Security, User Id
Edition: Volume 2 Issue 5, May 2013
Pages: 284 - 286
How to Cite this Article?
Pratik Ranjan, Nachiketa Tarasia, "Challenges in Password Memorization for Multiple Accounts of Single User", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201387, Volume 2 Issue 5, May 2013, 284 - 286
137 PDF Views | 107 PDF Downloads
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Similar Articles with Keyword 'Password'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2067 - 2068An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Similar Articles with Keyword 'User Id'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1954 - 1955Internal Intrusion Detection Systems
Bhingardive Deepali R, Ranmalkar Vrushali S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1237 - 1240A Study on Automation of E-Procurement System
P. Mahesh, B. Ujwala
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2366 - 2370A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage
Jaikishan Tindwani, Aruna Gupta
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 284 - 286Challenges in Password Memorization for Multiple Accounts of Single User
Pratik Ranjan, Nachiketa Tarasia