Downloads: 129 | Views: 270
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.7 / 10
Incorporated Approach for Multiserver Inaccessible User Authentication
Madhuri R. Shirkande
Abstract: Multi server remote client verification assumes essential part in distinguishing the aggressors of web administrations. In existing methods we utilized single server for identify remote user & security. In Multiserver remote user authentication people obtain their services by using mobile devices. Which require minimum computation and communication energy. Important goal of system is enhance security using ECC (Eliptic curve cryptography), OTP (one time password), And ATM Matrix card validation. Which withstand with offline Dictionary attacks, MIME attacks, malicious server attacks. Praposed scheme enhance security with mutual authentication between servers with minimum computation and communication energy. Multi server strategy is utilized for confirmation & security. The one server is used to give administration to the client & other server is utilized for enrolling the clients as a part of multi client server procedure. On the off chance that client has enrolled to the registration server than just he/she can get to the administration server. User can login in on administration client in the wake of getting the user ID, secret key in their database. With most reduced sum count overhead & littler keys ecliptic bend cryptography gives better security. So design such type of protocol which reduces the cost and computatation speed with enhanced security is main goal of system.
Keywords: Multiserver, Authentication, ECC, OTP, Matrix Validation
Edition: Volume 4 Issue 9, September 2015
Pages: 476 - 479
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1371 - 1376Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding
Saket Nigam, Rekhansh Rao
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2334 - 2337Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M