Transient Authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.
Authors and Affiliations
snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake
A Study on Feature Extraction and Classification on Medical Images
The field of medical imaging has gained many important advances with the increase in the need of a completely automated and highly efficient diagnosis system in a short period of time. The shortage of medical professio...
Algorithmic Procedure to Produce Near Optimal Interactivity And Reduce The Interaction Time Between Clients
Latency-driven distribution of servers is necessary even when there are no limits on the ease of use of server income at one location. In a distributed server structural design, the state of a DIA such as the effecti...
Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT
Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured...
Secured Diversified Data set Selection From Dynamic Data
Once the data is created, the data that it contains doesn’t change is known as static data (ex: newspaper).Where as the data can be change and update in the dynamic data (ex: website). A lot of information available...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...