Header menu link for other important links
RSJ Approach for User Authentication
Rawat A, Singh A.K, Jithin J, ,
Published in ACM Press
Volume: 12-13-August-2016

Some of the common works like, upload and retrieval of data, buying and selling things, earning and donating or transaction of money etc., are the most common works performed in daily life through internet. For every user who is accessing the internet regularly, their highest priority is to make sure that there data is secured. Users are willing to pay huge amount of money to the service provider for maintaining the security. But the intention of malicious users is to access and misuse others data. For that they are using zombie bots. Always Bots are not the only malicious, legitimate authorized user can also impersonate to access the data illegally. This makes the job tougher to discriminate between the bots and boots. For providing security form that threats, here we are proposing a novel RSJ Approach by User Authentication. RSJ approach is a secure way for providing the security to the user form both bots and malicious users. © 2016 ACM.

About the journal
JournalData powered by TypesetProceedings of the International Conference on Advances in Information Communication Technology & Computing - AICTC '16
PublisherData powered by TypesetACM Press
Open AccessNo