Downloads: 169 | Views: 354 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016 | Popularity: 6.4 / 10
Prevention of Phishing Threats using Visual Cryptography and One Time Password (OTP)
Sneha M. Shelke, Prachi A. Joshi
Abstract: Internet is todays common need and its being used for many purposes such as Email, business, shopping, e-commerce, social networking, financial transaction etc. With the increasing dependence on internet, the possibility of cheating/threats has been increasing day by day. One such threat is phishing attack which can perform identity theft. Phishing is the criminal and fraudulent act of attempting to acquire sensitive information such as username, passwords, account IDs, and credit card information etc by masquerading as a trustworthy entity in an electronic communication. The information thus acquired may be re-sold or used to cause financial losses. In the Internet, phishing can reach the user in several ways, e. g. , through a web browser pop-up, instant messaging or email. Recently a number of phishing attacks are increasing more and more. Hence there is a need for efficient mechanism for the prevention of phishing. In this paper, Cryptography and authenticating along with dynamic OTP has been proposed to recognize the whether the site is safe or unsafe to carry out transaction.
Keywords: Phishing, Visual cryptography share, OTP
Edition: Volume 5 Issue 2, February 2016
Pages: 65 - 69
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2002 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 699 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera