Transient Authentication

Abstract

In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.

Authors and Affiliations

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake

Keywords

Related Articles

Design of The CAN Bus Booster Pack and The Implementation of The CAN Protocol on the TIVA C Launch pad Evaluation Board

This paperis about the practical design of a CAN Bus Boosterpack and the implementation of the CAN protocol on the TIVA C Launchpad evaluation board. The boosterpack board contains a CAN transceiver that can make com...

UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data

Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacke...

A Distributed Algorithm for identifying failures in WSN

A wireless sensor network is a technology for monitoring physical or environmental conditions such as temperature, pressure, sound etc. A WSN can get separated into multiple connected sensors. But some nodes may fail...

A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT

Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...

Real Time Digital Signal Processing Based On Optical OFDM

The adaptability provided for Eventually Tom's perusing OFDM may be connected as transfer speed granularity to the clients. Done such an approach that every about them will make guaranteed An certain level for servic...

Download PDF file
  • EP ID EP27542
  • DOI -
  • Views 345
  • Downloads 6

How To Cite

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake (2013). Transient Authentication. International Journal of Research in Computer and Communication Technology, 2(2), -. https://europub.co.uk/articles/-A-27542