To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to *** authentication works via OpenID,Kerberos,password authentication protocols,***,there are still some limitations present in the reported security *** this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern *** proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and *** first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication *** Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing *** study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and *** experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via *** proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
COVID-19 has affected the whole world severely. Lockdowns and quarantines are imposed all over the world to prevent its spread. Hand sanitizers and face masks were made compulsory for individuals to apply for safety o...
详细信息
Many higher education institutions adapted to the Covid-19 pandemic by switching their teaching into online mode making use of online synchronous sessions using technologies such as Zoom. It was common for lecturers t...
详细信息
Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabet...
详细信息
Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabetic,pre-diabetic,or non-diabetic without the assistance of any physician or medical *** study’s methodology was classified into two the Diabetes Prediction Approach and the Proposed System Architecture *** Diabetes Prediction Approach uses a novel approach,Light Gradient Boosting Machine(LightGBM),to ensure a faster *** Proposed System ArchitectureDesign has been combined into sevenmodules;the Answering Question Module is a natural language processing Chabot that can answer all kinds of questions related to *** Doctor Consultation Module ensures free treatment related to *** this research,90%accuracy was obtained by performing K-fold cross-validation on top of the K nearest neighbor’s algorithm(KNN)&*** evaluate the model’s performance,Receiver Operating Characteristics(ROC)Curve and Area under the ROC Curve(AUC)were applied with a value of 0.948 and 0.936,*** manuscript presents some exploratory data analysis,including a correlation matrix and survey ***,the proposed solution can be adjustable in the daily activities of a diabetic patient.
A sophisticated type of symmetric encryption is called Multiuser Dynamic Searchable Symmetric Encryption. It expands the capabilities of conventional symmetric encryption to enable actions such as adding and removing ...
详细信息
With the advent of Industry 4.0, Ambient Intelligence, and other related technologies, self-Adaptation has been seen in modern systems. In this sense, Human-computer Interaction (HCI) requires an approach focused on t...
详细信息
Business Intelligence (BI) tools can provide benefits to various stakeholders in Higher Education Institutions (HEI) and support the academic process. We use BI tools to visualize data produced from learning analytics...
详细信息
作者:
PrathyakshiniPrathwiniPratheeksha Hegde, N.VaishaliRashmi, N.Kumar, Archana Praveen
NMAM Institute of Technology Department of Information Science and Engineering Karkala Nitte India
NMAM Institute of Technology Department of Master of Computer Applications Karkala Nitte India
NMAM Institute of Technology Department of Computer Science and Engineering Karkala Nitte India Manipal Academy of Education
Manipal Institute of Technology Department of Computer Science and Engineering India
Speech recognition systems play an integral role in numerous applications, from virtual assistants to accessibility tools. This paper offers a new viewpoint to speech recognition utilizing computer vision and deep lea...
详细信息
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie...
详细信息
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set...
详细信息
暂无评论