OPASS Authentication Schemes Using Android Mobile Application in Providing Web Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 132 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

OPASS Authentication Schemes Using Android Mobile Application in Providing Web Security

P. Shailaja

Popular form of authentication for user is through text password because of its effortlessness and convenience.On the other hand these passwords can be hacked by using malicious software and threads. Firstly, as users maintain several accounts on different websites they choose weak passwords which are easier to remember and they use same passwords for different websites. Reusing the same password for different websites may cause user to lose his information, if one account of user is hacked then hacker can gain access to all other accounts of user. Entering the passwords into public computers may not be safe if the attacker uses malicious software like keystroke logger to get users password. In this paper we design opass (one time password) authentication scheme for providing security to websites using an android mobile application. In this scheme we are using an android mobile and SMS (short message service) to prevent attacks while reusing passwords and stealing of passwords and to provide web security.

Keywords: authentication protocol, Opass Browser, web security

Edition: Volume 3 Issue 9, September 2014

Pages: 51 - 53

Share this Article

How to Cite this Article?

P. Shailaja, "OPASS Authentication Schemes Using Android Mobile Application in Providing Web Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP1416, Volume 3 Issue 9, September 2014, 51 - 53

Enter Your Registered Email Address





Similar Articles with Keyword 'authentication protocol'

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3253 - 3257

BIST Based Secure Data Aggregation in Wireless Sensor Network

Rakesh Kumar Ranjan, S. P. Karmore

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2067 - 2072

Review Paper on Secure Data Packet Transmission in Cluster Head and Base Station Using Wireless Sensor Network

Ashutosh S. Patil, Prof. Akhilesh A. Tyade

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1082 - 1087

Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud

Basant Kumar Gupta, Kalicharan Sahu

Share this Article

Similar Articles with Keyword 'web security'

Downloads: 108 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2302 - 2306

VILEEAR: Detection of Drive by Download attack on Malicious Web Pages

Chirag R. Desai, Dr. Narendra M. Shekokar

Share this Article

Downloads: 109 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Downloads: 109 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1410 - 1412

Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut, Bhushan Patil

Share this Article

Downloads: 111 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 510 - 514

A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services

Harshal A. Kute, D. N. Rewadkar

Share this Article

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3002 - 3005

Survey Paper on Genetically Optimized Face Image CAPTCHA

Juhi Shah, D. N. Rewadkar

Share this Article



Top