Web Based Security using Online Password Authentication in Mobile Application
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 142 | Monthly Hits: ⮙9

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

The internet has one of the most convenient and widely used media for people for exchanging information and to do business over the internet. E.g. Accessing web based emails, online auction or banking sites. But now a days accessing the internet is faced with many challenges. One of the most popular challenges is to ensure security with vital role to provide security in websites. Text password is a convenient and simplest form for a user authentication on websites, and it is level to security attacks. User mostly used weak password and it is often used across several websites and reuse password by typing into untrusted websites causes password threats. Hackers launch password stealing methods to grab password such as phishing, malware, and key loggers. The proposed system is a user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It uses three phases as registration, login and recovery phase. Here random password is generated for each login. Registration is used to register the user. Recovery phase is used, if the users mobile phone gets lost. The user needs remember only his long term password which has been stored in database very secretly and securely.

Keywords: Network security, User authentication, Long Term Password, One Time Password, LOPass

Edition: Volume 2 Issue 7, July 2013

Pages: 74 - 77

Share this Article

How to Cite this Article?

A. T. Bhole, Sheetal Chaudhari, "Web Based Security using Online Password Authentication in Mobile Application", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=0201393, Volume 2 Issue 7, July 2013, 74 - 77

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Network security'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Similar Articles with Keyword 'User authentication'

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 107 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Downloads: 108 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Similar Articles with Keyword 'Long Term Password'

Downloads: 124 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this Article

Downloads: 142 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 74 - 77

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

Share this Article

Similar Articles with Keyword 'One Time Password'

Downloads: 108 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Downloads: 112 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2465 - 2468

E-Voting Using Face Detection and Recognition (FDR), One Time Password (OTP)

Vahbiz Pardiwalla, Danista. S. Shaikh, Pooja Bhosale, Prof. J. R. Pansare

Share this Article

Downloads: 115 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 574 - 579

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

Avanti H. Vaidya, S. W. Mohod

Share this Article

Downloads: 117 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article



Top