Surveying Techniques and Development of Authentication Key in Smart-Devices

Abstract

In today's digital era of technology secure authentication is the basic need of every smart system. As the information security is the prime need of today’s systems so the authentication is the basic step of the process of authentication for the confidentiality of information. In this paper different authentication techniques and their development are given. Also we have described the comparison of them. The form of password from it’s simple to complex form is described.

Authors and Affiliations

Shubhangi Kotkar, Balbhim Bansode

Keywords

Related Articles

A Matlab Based Fault Analysis of TL

Nowadays the demand of electricity or power are increases day by day this result to transmit more power by growing the transmission line capacity from one place to the other place. But during the transmission some fault...

Digital Forensics: Analyze and Monitor Network Traffic Using Sniffer (Application Software)

Digital forensic is the process of interpreting and uncovering electronic data. The goal of process is to preserve any evidence in its most original form while applying performing a structured investigation by collectin...

Bandwidth Improvement of Slotted Patch Antenna Using Pin Short

FR4 is an inexpensive and easily available substrate material, which can be used to design efficient and cost effective microstrip patch antenna. This paper focuses on increasing the bandwidth of the microstrip patch an...

Experimental Study on Performance, Combustion and Emission Characteristics of Gossypium Hirsutum L. Biodiesel Fuelled with Single Cylinder 4-Stroke Diesel Engine

Gossypium Hirsutum L. also called as cotton is produced in more than 80 countries in the world. After harvesting process it will be traded as raw cotton, fiber as well as seeds. The oil will be used for producing biodie...

Energy Renormalization on the Sierpinski Pentagon Using Electrical Transform

In this paper the energy renormalization factor (resistence of the network) on the fractal Sierpinski Pentagon (Pentagasket) is described by the electrical network interpretation. First the Pentagasket-D5 is obtained by...

Download PDF file
  • EP ID EP24881
  • DOI -
  • Views 527
  • Downloads 16

How To Cite

Shubhangi Kotkar, Balbhim Bansode (2017). Surveying Techniques and Development of Authentication Key in Smart-Devices. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(7), -. https://europub.co.uk./articles/-A-24881