Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
By
Yi Xie
Yi Xie
Search for other works by this author on:
ISBN:
9780791859933
No. of Pages:
840
Publisher:
ASME Press
Publication date:
2011

Secure login is a counter measure for the shoulder surfing attack. Shoulder surfing is an observation technique of stealing the information by looking over someone's shoulder. Very often people are unaware of the presence of any external devices like the close circuit cameras and hidden surveillance equipment which are placed to capture their valuable information like the password etc. It is very easy to stand close to someone and look what the other person is typing on the keyboard. Secure login technique could be used in computers where confidential data are used, in highly secured nuclear servers authentication, ATM machines, Email login etc. The Secure Login will also consist of a RSA or MD5 encryption technique to protect the password. This counter measure helps in protecting the password from being stolen even if the password is typed in front of others.

Abstract
Keywords
1. Introductions
2. Related Past Techniques Used
3. Our Technique
4. Mathematical Analysis
5. Simulation
6. Advantages of Using This Technique
7. References
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal