Open Access Open Access  Restricted Access Subscription or Fee Access

Security Attacks and Algorithms

Anil Kumar Sharma, Manish Kumar Rewadia


The security attacks are the common problems in the data transfer. And various algorithms are available for countering these attacks. This study reviews the attacks and algorithms for the security purpose.

Keywords: Secure attacks, grid authentication security algorithms, security primitives

Cite this Article

Manish Kumar Rewadia, Anil Kumar Sharma. Security Attacks and Algorithms. Journal of Software Engineering Tools & Technology Trends. 2018; 5(3): 22–25p.

Full Text:



Pan G, Sun SP, Chan C, Yeong LC. Analytics and Cyber security: The shape of things to come. CPA. 2015; 1–94p.

Gelenbe E, Abdelrahman OH. Search in the Universe of Big Networks and Data. IEEE. 2014

Balilo BB, Gerardo BD, Medina RP. A comparative analysis and review of OTP Grid Authentication Scheme: Development of new scheme. International Journal of Scientific and Research Publications. Nov 2017; 7(1):

Yoon E, Yoo K. Improving the Generalized Password-Based Authenticated Key Agreement Protocol. The 3rd International Conference on Grid and Pervasive Computing - Workshops, Kunming, 2008; 341–346p.

Robinson J et al. Web-enabled grid authentication in a non-Kerberos environment. The 6th IEEE/ACM International Workshop on Grid Computing. Seattle, WA, USA, 2005; 5p.

Princes PSS, Andrews J. Analysis of various authentication schemes for passwords using images to enhance network security through online services. International Conference on Information Communication and Embedded Systems (ICICES), Chennai. 2017; 1–8p.

Park BS, Choudhury AJ, Kim TY, Lee HJ. A study on password input method using authentication pattern and puzzle. 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seogwipo. 2011; 698–701p.

Nicanfar H, Leung VCM. Smart grid multilayer consensus password-authenticated key exchange protocol. 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, 2012; 6716–6720p.

Gao Q. Biometric authentication in Smart Grid. 2012 International Energy and Sustainability Conference (IESC), Farmingdale, NY. 2012; 1–5p.

Sukanya S, Saravanan M. Image based password authentication system for banks. International Conference on Information Communication and Embedded Systems (ICICES), Chennai. 2017; 1–8p.

Beckles B, Haidar AN, Zasada S, Coveney PV. Audited credential delegation: A sensible approach to grid authentication. 2009 5th IEEE International Conference on E-Science Workshops, Oxford, 2009; 19–30p.


  • There are currently no refbacks.

This site has been shifted to