One-Time Password Authentication System In Website
The world we know how are mostly using the internet in any place and time in the world. We are connected to the social media, gaming platform, blog sites, business area, online shopping and much more every day without stopping. Internet can be useful however it has its own down side. Lately during t...
| Main Author: | Azham Helmi, Azmi |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40172/ http://umpir.ump.edu.my/id/eprint/40172/1/CA19040.pdf |
Similar Items
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Leave-one-out authentication of persons using 40 Hz EEG oscillations
by: Ravi, , KVR, et al.
Published: (2005)
by: Ravi, , KVR, et al.
Published: (2005)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Website accessibility performance evaluation in Malaysia
by: Jati, H., et al.
Published: (2008)
by: Jati, H., et al.
Published: (2008)
A survey on Islamic Websites for children
by: Kh. Abdulatif, Zaidoon, et al.
Published: (2011)
by: Kh. Abdulatif, Zaidoon, et al.
Published: (2011)
Verification of scholars and references in Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Building trustworthy E-commerce website
by: Che Hussin, Ab. Razak
Published: (2007)
by: Che Hussin, Ab. Razak
Published: (2007)
Measuring Website Usability Construct as Second Order Construct in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
Weighted one-sided splicing systems
by: Yee, Sian Gang, et al.
Published: (2014)
by: Yee, Sian Gang, et al.
Published: (2014)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
The perception of Muslim users on reliability of Islamic
websites
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
A framework for heuristic evaluation on Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
User experience on educational websites’ search engine.
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Assessing Website Usability Attributes
by: Nur Sukinah, Aziz, et al.
Published: (2014)
by: Nur Sukinah, Aziz, et al.
Published: (2014)
Similar Items
-
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018) -
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008) -
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007) -
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)