Transient Authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.
Authors and Affiliations
snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...
Optimized Word Sense Disambiguation in Hindi using Genetic Algorithm
Word Sense Disambiguation (WSD) is a problem of computationally determining which “sense” of a word is activated by the use of the word in particular context. Genetic Algorithm is used to figure out the appropriate m...
LACK OF TRAINING DATA IN SENTIMENT CLASSIFICATION: CURRENT SOLUTIONS
In recent years, sentiment classification has attracted much attention from natural language processing researchers. Most of researchers in this field consider sentiment classification as a supervised classification p...
Human Gait Based Gender Classification Using Various Transformation Techniques
Gender classification such as classifying human face is only challenging for computer, but even hard for human in some cases. In our work a new novel approach is proposed to recognize gender from the face image. Cont...
Distributed Arithmetic Architecture based FIR Filter Implementation for Discrete Wavelet Transform
Corruption in image due to noise is most common problem faced in image pre-processing methods. Image denoising technique is one of the initial steps of image pre-processing. Noise often gets inserted in digital images...