Submit Search
Upload
Smart-Authentication: A secure web service for providing bus pass renewal system
•
0 likes
•
35 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I2114.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Image authentication for secure login
Image authentication for secure login
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Secure instant messanger service
Secure instant messanger service
Aditya Gupta
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET Journal
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Recommended
Image authentication for secure login
Image authentication for secure login
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Secure instant messanger service
Secure instant messanger service
Aditya Gupta
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET Journal
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Instant messaging tech scet
Instant messaging tech scet
pankaj gamit
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
More Related Content
What's hot
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Instant messaging tech scet
Instant messaging tech scet
pankaj gamit
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
What's hot
(19)
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
Instant messaging tech scet
Instant messaging tech scet
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
Similar to Smart-Authentication: A secure web service for providing bus pass renewal system
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
IRJET Journal
3M Secure Transportation System.
3M Secure Transportation System.
IRJET Journal
IRJET- E-Gatepass System
IRJET- E-Gatepass System
IRJET Journal
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
IRJET Journal
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured attendance system
IJECEIAES
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
Cloud Based intrusion Detection System
Cloud Based intrusion Detection System
IJMTST Journal
User Documentation Verification Portal
User Documentation Verification Portal
IRJET Journal
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
TELKOMNIKA JOURNAL
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Cybersecurity Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
International Journal of Computer and Communication System Engineering
Similar to Smart-Authentication: A secure web service for providing bus pass renewal system
(20)
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
3M Secure Transportation System.
3M Secure Transportation System.
IRJET- E-Gatepass System
IRJET- E-Gatepass System
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured attendance system
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
Cloud Based intrusion Detection System
Cloud Based intrusion Detection System
User Documentation Verification Portal
User Documentation Verification Portal
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Cybersecurity Slides
Cybersecurity Slides
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
power system scada applications and uses
power system scada applications and uses
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Internship report on mechanical engineering
Internship report on mechanical engineering
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Smart-Authentication: A secure web service for providing bus pass renewal system
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 669 Smart-Authentication: A secure web service for providing bus pass renewal system Priyanka Bhunde1, Rutuja Pol2, Trupti Chandgude3,Shambhavi Nangare4 ,Prof. Shrikant Nagure5 1Priyanka Bhunde, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 2Rutuja Pol, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 3Trupti Chandgude, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 4Shambhavi Nangare, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 5Professor Shrikant Nagure, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Now a day we are towards the development of smart city, so all people want everything on their finger tips and there has been also increase in use of mobile devices like smart phones and tablets. Web has become the dominant interface for people to conduct their daily businesses on the Internet or a corporate network. People use their PCs to check email, access financial accounts, to do online shopping, all through a web browser. In this paper We are developing an application for bus pass renewal and we are providing Web security using Smart-Authentication, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter various password attacks including man- in-the-middleandphishingattacks. InSmart-Authentication, a mobile device is used as the second authentication factor to vouch for the identity of a use that is performing a web login from a PC. Smart-Authentication employs public key cryptography to ensure the Security of authentication process. We implemented a prototype systemofSmart-Authenticationthat consists of an Android application, a Chrome browser extension, and a Java-based web server. Key Words: : QR-Code or Barcode, Visible Light Communication (VLC),Phishing attack,Cryptography web server,TFA(Two Factor Authentication). 1.INTRODUCTION In several areas and particularly in business, Web has become the dominant interface for people to conduct their daily businesses on the web or company network authentication .In general, a user authenticates herself to an internet application hosted on a remote server by coming into her username and positive identification in the application’s login page (either manually or mechanically through a positive identification manager). positive identification has been the First State facto methodology for net authentication [1]. However password only authentication cannot give ample cannot give ample protection because the mechanism is at risk Of a range of attacks together with shoulder surfing attack [2] To improve net authentication security and facilitate positive identification management, thought net browsers(e.g chrome , Firefox, and net Explorer) have introduced integral positive identification managers Standalone positiveidentificationManagers(e.g.,1Password and KeyPass) and web based positive authentication managers that run during browser. However, a passwordmanageralonedoes notprovideample security assurance due to insecurecomputingenvironments at either native or remote. Zhao and Cantonese dialect showed that none of the browser integral password managers in thought net browsers may stop malware from stealing passwords during a laptop setting [3]. Recent studies on net on net positive identification automobile filling [11] and web based password managers [4] reveal that there exist variety of Serious vulnerabilities instandard positive identification Managers. In recent years we have observedthatfrequenthappeningof knowledge breaches and positive identification info leaks that occurred on outstanding websites similar to LinkedIn , Yahoo! and Gmail .Those positive identification leaks endanger countlesspeople’s data securitynotsolelyonthose websites however additionally on alternative websites thanks to positive identification employ to create matters worse, attackers usually launch MITM attack and phishing attack to steal users’ passwords. The recent MITM attack against Iranian Google users demonstrates that even a user of well maintained and hardened web site may be subjected to the MIMM attack. Camauth consist of an android application ,a chrome browser extension,and a java-based web server .The main of this project to assure the security of web security while renew a pass ,it is very cost effective and convenient to the user .This system is made as user friendly as possible so that anyone can use it with little knowledge of system computers. 2. LITERATURE SURVEY We first evaluate CamAuth using the web authentication assessment framework proposed by Bonneau et al. [1]. We compare e CamAuth with passwords, a most popular TFA scheme—Google 2-step verification(2SV)[6],anda relevant
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 670 mobile device based TFA scheme—PhoneAuth (in strict mode) [7].A barcode scanning using smartphone is already widely used, we grant Easy-to-LearnandquasiEasy-to-Useto CamAuth according to the definitionofthosebenefits[1]. We believe that CamAuth (barcode scanning as user action) is easier to use than 2SV (PIN typing as user action) even though both have the same rating. We grant quasi Infrequent-Errors to CamAuth, the same as all others, as barcode scanning from either smartphone or PC is fairly accurate and the camera performance keeps improving. 3. BACKGROUND Two-factor authentication (TFA) requires the presentation of two or more authentication factors: something a user knows (e.g., a password), something a userhas(e.g.,a secure token), and something a user is (e.g., biometric characteristics) In this paper we are developing an application for bus pass renewal and we are providing Web security using Smart- Authentication, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter variouspasswordattacksincludingman- in-the-middle and phishing attacks. In Smart-Authentication, a mobile device is used as the second authentication factor to vouch for the identity of a use that is performing a web login from a PC. Smart Authentication employs public key cryptography to ensure the security of authentication process. We implemented a prototype system of Smart-Authenticationthatconsistsof an Android application, a Chrome browser extension, and a Java-based web server. Recently camerabased communications have attracted much attention given the increasing popularity of mobile devices with one or more built-in cameras. Barcode scanning is the primary application domain of camera-based communications. A barcode is an optical machine-readable representation of information. There are two types of barcodes: one dimensional (1D) barcodes and two dimensional (2D) barcodes. Quick Response code (QR code) is a popular 2D barcode. All major Smartphone platforms support QR code scanning either natively or through third-party applications. As camera- based communications are short-range, highly directional, fully observational, and immune to electromagnetic interference, they have been appliedtosecurityapplications. There are four main modules in project are as follows: Fig -3.1: System architecture of bus pass system using web server. A. User registration: User registration is used for KYC(know your customer) in which you have to uploadyourdocumentslikephoto,aadhar card and enroll your mobile number and set your useridand password according to your wish. B. User authentication: In this phase user has to enter his userid and passwordifitis correct then it will go ahead and ask for your aadharcardno, mobile number etc it will scrutinize all details with the details which are stored in the database. C. CamAuth registration: In this phase, barcode i.e QR code is generated and then it is send to laptop through which transcation is going on and then QRcode is also send to registered mobile number ofthe respective user. D .Camauth Authentication: In this phase QRcode which is received on registered mobile number is scanned by laptop’s webcam through the secure visible light communication channel. If QRcodematch’sthen it will proceed further. Then user will get choice to choose his rout and other things related to bus pass. But theQRcode which will be generated will be having time session if user doesn’t enter QRcode within that time then it will get timed out. 4. SUMMARY Web authentication is the main part of camauth. we presented a secure bus pass renewal system using CamAuth.The online bus pass system will help to get a bus passes online and reduce Endeavour. User can obtain all bus related information through this system.It is camera based TFA scheme that provide security of web login.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 671 Fig -4.1: Activity diagram 5. CONCLUSION In this paper we presented a secure buspassrenewal system using CamAuth, a camera based TFA scheme that augments the security of web login from PC. Leveraging the high market penetration of mobiledevicesandpervasive barcode scanning through camera, CamAuth realizes two-factor Authentication through passwords plus barcode scanning using user’s mobile device. The public-keycryptography and secure visible light communications ensure that CamAuth can effectively defeat password stealing attacks including man-inthe- middle and phishing attacks. CamAuth requires no Modification to existing network protocolsandoperating system of PC and mobile device. Our viability of the scheme. In future, prototype system and preliminary user study demonstrate the we plan to conduct an extensive usability study to better understand the impact of using barcode scanning for web login on average users physically and psychologically. 6.REFERENCES [1] CamAuth: Securing Web Authentication with Camera Mengjun Xie ,Yanyan Li , Kenji Yoshigoe , Remzi Seker , Jiang Bian Department of Computer Science University of Arkansas at Little Rock 2015. [2] M. Mannan and P. van Oorschot, Leveraging personal devices for stronger password authentication from untrusted computers,Journal of Computer Security, vol. 19, no. 4, pp. 703–750, 2011 [3] A. Czeskis, M. Dietz, T. Kohno, D. Wallach, andD.Balfanz, “Strengthening user authentication through opportunistic cryptographic identity assertions”,in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS ’12, 2012, pp. 404–414. [4] B. Parno, C. Kuo, and A. Perrig, “Phoolproof phishing Prevention”,in Proceedings of the 10th International Conference onFinancial CryptographyandData Security (FC 2006), 2006, pp. 1–19. [5] J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes”,in Proceedings of the 2012 IEEE Symposiumon Security and Privacy, 2012, pp. 553–567. [6] F. Tari, A. A. Ozok, and S. H. Holden,”A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords”, in Proceedings of the Second Symposium on Usable Privacy and Security, ser. SOUPS ’06, 2006, pp. 56–66.
Download now