Downloads: 115 | Views: 244
Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10
Secure Server Verification by using Encryption Algorithm and Visual Cryptography
Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan
Abstract: : In the area of the internet, various online attacks have been increased day by day and among them the most popular attack is phishing Which is done by hackers or unauthorized users. Phishing is an attempt by an individual or a group to acquire personal confidential information such as passwords, credit card information etc. from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Hackers hosts similar website to misguide the user and store the confidential information of the user to their own website by providing link. Without proper safeguards, applications are vulnerable to various forms of security attack. Thus it is very important for the users to identify the fake and genuine website. Thus the online security is major part websites. In this paper we have proposed a new approach for the identification of genuine server named as Secure Server Verification by Using RSA Algorithm and Visual Cryptography to solve the problem of phishing. Here an image based authentication using Visual Cryptography (VC) is used and the encryption algorithm is used.
Keywords: phishing, authentication, security, theft, safeguard, confidential
Edition: Volume 3 Issue 12, December 2014
Pages: 310 - 313
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1766 - 1770IoT Enabled Intelligent Cargo Management System
Sanchit Arun Parwate, Smrity Baral
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan