Academic literature on the topic 'Encrypted Negative Password (ENP)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted Negative Password (ENP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encrypted Negative Password (ENP)"

1

Shiva, Kumar G. V., Devananda S. N. Dr, and G. K. Suhas. "Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection." Recent Innovations in Wireless Network Security 3, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4709674.

Full text
Abstract:
Password protection schemes (such as hash passwords, salt passwords, key expansion) cannot resist lookup table or dictionary attacks.. Secure secret key stockpiling might be a crucial perspective in frameworks upheld secret phrase confirmation, which stays the chief generally utilized verification strategy, regardless of some security flaws. The aim of this research paper is twofold: first, to improve security in authentication mechanism by passing the received password from source node to hash function and convert it into ENP. Second to perform repeated operation of encryption to further impr
APA, Harvard, Vancouver, ISO, and other styles
2

Sachin, Jadhav, Jamadar Sana, Lande Pooja, and Mane Gayatri. "A Novel Authentication Framework Using Negative Password Method for Improving Security." Journal of Network Security Computer Networks 5, no. 1 (2019): 1–7. https://doi.org/10.5281/zenodo.2538899.

Full text
Abstract:
Password storage is a critical angle in frameworks dependent on secret word verification, which is the most broadly utilized confirmation method. In this paper, we contemplated a secret key verification structure that is intended for secure secret phrase stockpiling and can be effortlessly utilized into existing validation frameworks. In this system, first, they got plain secret word from a customer is waded through a cryptographic hash work (SHA-256) and a plan dependent on MD5 calculation (for secret phrase stockpiling). Accordingly the hashed secret key is changed over into a negative secre
APA, Harvard, Vancouver, ISO, and other styles
3

Sudhakaran, Pradeep, Manikannan Kaliyaperumal, and V. Sindhu. "Secured Authentication and Key Sharing Using Encrypted Negative Password in IoT Devices." ECS Transactions 107, no. 1 (2022): 12713–21. http://dx.doi.org/10.1149/10701.12713ecst.

Full text
Abstract:
State hoarding is an important consideration in systems that use a mystery word request, which is now the most widely used check mechanism for removing security issues. In this study, we present a perplexing word check structure that is expected to provide safe riddle word handling and might potentially be integrated into existing explanation frameworks. They received a clear puzzle enunciation from a client who had astounded out a cryptographic hash work in our sequence of events. The hashed puzzle verbalization is adjusted into a negative problem key at that time. Finally, using a symmetric-
APA, Harvard, Vancouver, ISO, and other styles
4

Vikhe, Ms Prajakta. "Secured Application Environment using Enhanced Graphical Passwords." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1462–69. http://dx.doi.org/10.22214/ijraset.2021.35293.

Full text
Abstract:
Today computer and mobile based applications has become an integral part of our life. Thus, there arises a need of a reliable security while using these applications using authentication techniques that are most secured and hard to crack. Today many authentication techniques are introduced for better security and replace textual authentication technique. But these techniques are proving insufficient, so new ways should be studied and introduced for better security. So, we are concentrating on two such techniques, first we studied graphical authentication systems using images. The one such tech
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Wenjian, Yamin Hu, Hao Jiang, and Junteng Wang. "Authentication by Encrypted Negative Password." IEEE Transactions on Information Forensics and Security 14, no. 1 (2019): 114–28. http://dx.doi.org/10.1109/tifs.2018.2844854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jadhav, Mayuri. "Authentication by Encrypted Negative Password using SHA-256 and RSA Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. 4 (2021): 1260–64. http://dx.doi.org/10.22214/ijraset.2021.33897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sridharan, M., and L. Karthika. "Execution of Password Authentication Encrypted Negative Password using MD5." International Journal of Science and Management Studies (IJSMS), April 30, 2021, 44–48. http://dx.doi.org/10.51386/25815946/ijsms-v4i2p106.

Full text
Abstract:
Hypothetical Secure mystery express accumulating is a crucial perspective in systems considering secret expression affirmation, which is at this point the most extensively used approval method, disregarding its some security abandons. In this paper, we propose a mysterious key affirmation structure that is expected for secure mystery key storing and could be adequately organized into existing approval systems. In our construction, first, they got plain mystery word from a client is worked out a cryptographic hash work (e.g., SHA-256). By then, the hashed secret expression is changed over into
APA, Harvard, Vancouver, ISO, and other styles
8

R, Abinaya. "Secure Banking Transaction using Encryption Based Negative Password Scheme." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, August 5, 2020, 402–10. http://dx.doi.org/10.32628/cseit206475.

Full text
Abstract:
Password authentication is the most widely used authentication technique, for it is available at a low cost and easy to deploy. Many users usually set their passwords using familiar vocabulary for its convenience to remember. Passwords may be leaked from weak systems. Vulnerabilities are continuously being determined, and no longer all systems may be well timed patched to resist attacks, which give adversaries an opportunity to illegally access vulnerable systems. To overcome the vulnerabilities of password attacks, here propose a password authentication framework that is designed for secure p
APA, Harvard, Vancouver, ISO, and other styles
9

Latha, Dr D. Hema, Azmath Mubeen, and Dr D. Rama Krishna Reddy. "Password Substantiation with Negative Password Encryption." International Journal of Advanced Research in Science, Communication and Technology, November 29, 2020, 184–90. http://dx.doi.org/10.48175/ijarsct-621.

Full text
Abstract:
Secure secret password storage is an essential perspective in frameworks dependent on secret phrase Substantiation method, which is as yet the most broadly utilized Substantiation confirmation procedure, in spite of its some security imperfections. In this paper, a secret key Substantiation architecture structure is implemented that is intended for secure secret password storage and could be effectively incorporated into existing authentication frameworks. In this framework first the plain password which is received from the customer is given to cryptographic hash component for SHA-256 cryptog
APA, Harvard, Vancouver, ISO, and other styles
10

"Secure Login System using MD5 and AES Attribute Based Encryption Algorithm." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (2020): 810–14. http://dx.doi.org/10.35940/ijitee.h6509.069820.

Full text
Abstract:
The cryptographic hash work and symmetric encryption make it hard to break Passwords. Secure secret word stockpiling is a crucial perspective in framework dependent on secret word verification, which is as yet the most broadly utilized confirmation system, notwithstanding its some security imperfections. So basically, this work is based on providing security to the systems. Right now, propose a secret word verification structure that is intended for secure secret word stockpiling and could be effectively coordinated into existing confirmation frameworks. In our system, first, the got plain sec
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Encrypted Negative Password (ENP)"

1

Barua, Namrata, Tanusree Saha, Jui Pattanayak, and Prolay Ghosh. "Encrypted Negative Password (ENP) Authentication System." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. https://doi.org/10.4018/979-8-3373-1032-9.ch019.

Full text
Abstract:
Password authentication is among the most effective ways to authenticate for security resiliency. The challenge of securely keeping credentials is one of the most important ones. Based on the Negative Database (NDB), a cryptographic hash function, and symmetric encryption, our study suggests the Encrypted Negative Password (ENP) password protection approach. Methods: This paper suggests a password verification structure for protected password storage that may be effectively incorporated into existing authentication systems. A hybrid method is used to encrypt the client's plain password. Additi
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encrypted Negative Password (ENP)"

1

Sai, N. Raghavendra, Tejaswi Cherukuri, Susmita B., Keerthana R., and Anjali Y. "Encrypted Negative Password Identification Exploitation RSA Rule." In 2021 6th International Conference on Inventive Computation Technologies (ICICT). IEEE, 2021. http://dx.doi.org/10.1109/icict50816.2021.9358713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!