International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 107

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015


Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale


Abstract: Single sign-on mechanism is an authentication mechanism in which user sign on only once but their identities verified by many services they want to access later. Practically, it happens that if you wish to access any service then identification of user is an important task. So first you have to register for that service then you become authenticated user. Suppose you want to access many services then you have to create different set of credentials and memorize it. But in proposed system user need only one credential to access many services in distributed computer network. In existing system two types of attacks are found. i. e. impersonation attack and session attack. In impersonation attack, a bogus service provider is able to hack up the credential of authorized user. In session attack, an unauthorized user is able to enjoy the resources and services accessible by service providers. In proposed research work, credential privacy and soundness is protected. By using Diffie-Hellman Key Exchange and Elliptic curve Encryption Algorithm authentication is secure.


Keywords: Credential privacy, soundness, diffie-hellman key exchange, elliptic curve cryptography


Edition: Volume 4 Issue 7, July 2015,


Pages: 1235 - 1237


How to Cite this Article?

Deepali M. Devkate, N. D. Kale, "Single Sign-on Secure Password Mechanism for Distributed Computer Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB156557, Volume 4 Issue 7, July 2015, 1235 - 1237

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Credential privacy'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1281 - 1284

Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks

Bommasani Nagasai, P. Srilatha

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Share this Article

Similar Articles with Keyword 'soundness'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1281 - 1284

Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks

Bommasani Nagasai, P. Srilatha

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Share this Article

Similar Articles with Keyword 'elliptic curve cryptography'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Similar Articles with Keyword 'Credential'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article
Top