International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 244

Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10


     

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan


Abstract: : In the area of the internet, various online attacks have been increased day by day and among them the most popular attack is phishing Which is done by hackers or unauthorized users. Phishing is an attempt by an individual or a group to acquire personal confidential information such as passwords, credit card information etc. from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Hackers hosts similar website to misguide the user and store the confidential information of the user to their own website by providing link. Without proper safeguards, applications are vulnerable to various forms of security attack. Thus it is very important for the users to identify the fake and genuine website. Thus the online security is major part websites. In this paper we have proposed a new approach for the identification of genuine server named as Secure Server Verification by Using RSA Algorithm and Visual Cryptography to solve the problem of phishing. Here an image based authentication using Visual Cryptography (VC) is used and the encryption algorithm is used.


Keywords: phishing, authentication, security, theft, safeguard, confidential


Edition: Volume 3 Issue 12, December 2014


Pages: 310 - 313



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan, "Secure Server Verification by using Encryption Algorithm and Visual Cryptography", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 310-313, https://www.ijsr.net/getabstract.php?paperid=SUB14323, DOI: https://www.doi.org/10.21275/SUB14323



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1766 - 1770

IoT Enabled Intelligent Cargo Management System

Sanchit Arun Parwate, Smrity Baral

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article



Top