Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/6820
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUpadhya, A.H.K.
dc.contributor.authorAvinash, K.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T09:46:11Z-
dc.date.available2020-03-30T09:46:11Z-
dc.date.issued2015
dc.identifier.citation6th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2015, 2015, Vol., , pp.204-216en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/6820-
dc.description.abstractThis paper deals with the introduction of an information security mechanism to deal with the increasing threats of password hijack attacks. The proposed work deals with application of secret sharing principles for the protection of critical credentials of the stakeholders such as login Id and password. It is based on the fact that individual segments of passwords or credentials are ineffective without the existence of the remaining segments. We try to establish this fact to our advantage by proposing an implementation where password segments are distributed across several databases to strengthen their security and integrity and thereby, eliminate the threat of credential hijacking or phishing. The distributed nature of the divided segments of data can ensure lower probability of a successful attack. To summarize, an alternative encryption mechanism based on secret sharing is proposed which could be computationally efficient and which could provide equivalent or greater security in comparison with the standard cryptographic algorithms.en_US
dc.titleSecure data management - Secret sharing principles applied to data or password protectionen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.