A Survey on Existing Password Storage Methods and their Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 100 | Views: 249 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.6 / 10


     

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik


Abstract: Each user need accounts to access service for website. Any account authentication or identification password is required, but most of the user choose easily remembered password which give low security protection. Some user keeps same password for all accounts. Proposed system pendrive is used to store more number of password with high security. In this paper, there are few methods to store password securely.


Keywords: Password, Pendrive, Password Protection, Security


Edition: Volume 6 Issue 4, April 2017


Pages: 1760 - 1762



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Samruddhi Patil, Kumud Wasnik, "A Survey on Existing Password Storage Methods and their Security", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 1760-1762, https://www.ijsr.net/getabstract.php?paperid=ART20172807, DOI: https://www.doi.org/10.21275/ART20172807

Similar Articles

Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article
Top