Secure Authentication Schemes
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical passwords lack security due to hotspot coverage or attacker can record the password using camera. Token-based approach can be lost or stolen. Biometric systems cannot be changed. Later another security method emerges which combines the above methods into one scheme forming a 3-D password.3-D password is a multidimensional authentication scheme providing a virtual environment. It integrates muli-factor, multidimensional, multi-level security mechanisms. This paper presents a study on various authentication schemes based on security analysis.
Authors and Affiliations
Chintu Mathew, Arya Babu
Effective Load Balancing Technique And Memory Management In Cloud
Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...
Reducing Latency Among Client-Server for Distributed Interactive Applications
The interactivity of DIAs is significant for members to have pleasant communication experiences. As a rule, interactivity is considered by the duration from the time when a participant issues an operation to the time...
Development of Antirigging Voting System Using Finger Print
Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present and use implementation is to implement the development of anti rigging voting system using finger print .The pu...
AR Simulated Camera
This paper provides an interactive idea for interior designing application using augmented reality (AR). Augmented reality merges real world and virtual world together. Due to the developing technology and lack of time,...
Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform
Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...