ACM Transactions on Information and System Security (TISSEC)
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Cache Cookies for Browser Authentication (Extended Abstract)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
SPP: An anti-phishing single password protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic pharming attacks and locked same-origin policies for web browsers
Proceedings of the 14th ACM conference on Computer and communications security
On the Effectiveness of Techniques to Detect Phishing Sites
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
Case study for running HPC applications in public clouds
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Seeking supernovae in the clouds: a performance study
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Migrating a (large) science database to the cloud
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Editorial: Advanced topics in cloud computing
Journal of Network and Computer Applications
Using one-time passwords to prevent password phishing attacks
Journal of Network and Computer Applications
Windows Azure Platform
Hi-index | 0.00 |
Cloud is the next generation computing platform. Cloud computing provides dynamically scalable virtualised computing resources as a service over the internet. It is a technology that provides software, computation, data access and storage services at a relatively low cost to the users. Cloud servers store enormous amount of crucial data which are vital for cloud computing services. Therefore, it becomes essential to authenticate the legitimate users of the cloud before they can access this data. Phishing attacks are the most popular in twenty-first century cyber crime which are becoming more sophisticated and therefore are a major threat to cloud computing services. In this paper, we propose a password-based anti-phishing protocol which authenticates the legitimate users of the cloud. The proposed protocol is based on the cutting edge technology of elliptic curve cryptography and therefore offers best security at a low cost.