Double Authentication Model using Smartphones to Enhance Student on-Campus Network Access
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Computers are widely used by all universities to provide network access to students. Therefore, the securities of these computers play a major role in protecting the network. In light of that, a strong access control is required to ensure that sensitive information will only be accessed through firm authentication mechanism. Smartphones are widely used by students, and can be employed to further enhance student authentication by storing partial access information on the Smartphone. And while students should not leave their computer systems unattended, some do. Therefore, daily network access requires that computer unit to be configured in a way that includes password authentication and an access code stored on a device (the smartphone) which needs to be presented by the user during the authentication process. It is a fact that software and hardware may fail to fully secure and protect systems, but user’s negligence to safeguard their systems by logging out of the computer unit before moving away is far more serious security issue. The system being developed in this research will lock the computer unit once the student moves away from that computer unit and loosing communication with the smartphone.
Authors and Affiliations
Zakaria Saleh, Ahmed Mashhour
An Approach to Calculate the Efficiency for an N-Receiver Wireless Power Transfer System
A wireless power transfer system with more than one receiver is a realistic proposition for charging multiple devices such as phones and a tablets. Therefore, it is necessary to consider systems with single transmitters...
Generating Representative Sets and Summaries for Large Collection of Images Using Image Cropping Techniques and Result Comparison
The collection of photos hosted on photo archives and social networking sites has been increasing exponentially. It is really hard to get the summary of a large image set without browsing through the entire collection. I...
A Novel Algorithm to Improve Resolution for Very Few Samples
This paper presents a new technic to improve resolution and direction of arrival (DOA) estimation of two closed source, in array processing, when only few samples of received signal are available. In these conditions, th...
State-of-the-Art and Open Challenges in RTS Game-AI and Starcraft
This paper presents a review of artificial intelligence for different approaches used in real-time strategy games. Real-time strategy (RTS) based games are quick combat games in which the objective is to dominate and des...
Techniques, Tools and Applications of Graph Analytic
Graphs have acute significance because of poly-tropic nature and have wide spread real world big data appli-cations, e.g., search engines, social media, knowledge discovery, network systems, etc. Major challenge is to de...