Call for papers :

Submission Last Date 31/03/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Privacy And Secure Authentication Using Cooperative Query Answer
Many web applications provide secondary authentication methods, i.e., secret queries, recovery mail , to reset user password when login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools; moreover, creating the secret queries after long a user may forget her/his answers. Todays prevalence of smartphones has granted us new chances to observe and understand how the personal data collected by smartphone sensors and apps can help create personalized secret queries without violating the users privacy concerns. , In my project, provide a Secret-Q based security system, its called as “Secret-QA”, that creates a set of secret queries from the user smartphone usage. I develop a model on Android smartphones, and evaluate the security of the secret queries by asking the acquaintance/unknown person who participates in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the queries by asking participants to answer their own queries. Our experimental results reveal that the secret queries related to motion sensors, calendar, app installment, and part of legacy app usage history (e.g., phone calls) have the best memorability for users as well as the highest robustness to attacks.
Android, Server, gyroscope sensor,
Others Details
Paper Id : 12606
Author Name : Mrs. R. salini
Co-Author Name(s) : Sharmila SThendral RThaaraheswari V
Volume/Issue No : Volume 05 Issue 03
Page No : 1-6
DOI Number : DOI:10.21090/IJAERD.12606
Publication Date : 2018-03-06
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website :
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406