A Survey on the Use of 3D Password in Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Passwords play an important role in various computing applications like ATM machines, internet services, windows login, and authentication in mobiles etc. There are many authentication techniques are available, Such as textual password, Graphical password, biometric password and token based password etc. But each of this individually having some advantages & disadvantages. To overcome the Drawbacks of existing authentication technique we propose a new improved authentication technique called as called as 3D password. The 3D password is a multifactor authentication scheme. The 3D passwords are more customizable and very interesting way of authentication. The 3D password can combine most existing authentication schemes such as knowledge based passwords, graphical passwords, and various types of graphics into 3D object virtual environment. The proposed authentication scheme is hard to break & easy to use. Finally, some suggestions are given for future research.
Authors and Affiliations
Paruthi Ilam Vazhuthi P, Geetha M, Parthiban S
Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing
Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store p...
FEA Study of Pre-Fill Valve
Pre-fill valve is Pilot-operated check valve which is designed to permit free flow in one direction and to block return flow, unless pilot pressure is applied. However, under pilot pressure, flow is permitted in both di...
Relation Between Nature, Time Travel Man & Future Computer
Every - thing is possible in this universe, as we know that energy / atom can neither be created nor destroy & energy can be transfer from one form to another form. So, on the basis of this theory – i will try to search...
Efficient Fir Filter Implementation Based On Minimum Logic Depth Tree
Multiple constant multiplication (MCM) scheme is widely used for implementing direct-form FIR filters. While the research focus of MCM has been more effective on common sub expression elimination, the optimization of ad...
Performance of Bamboo Reinforced Concrete Beam a Review
To minimize the cost of construction so that houses and other structures may be made in fairy price to the common man of the society, in these paper work bamboo strips had been provided as potential reinforcement in con...