Transient Authentication
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.
Authors and Affiliations
snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...
The Effect of NCT Techniques on SC-FDMA System in presence of HPA
In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...
Survey on Different Data Hiding Techniques
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...
Implementation Of Radix-10 Matrix Code Using High Speed Adder For Error Correction
Memories are most widely used component in electronic systems. As CMOS technology scales down, multiple cell upsets (MCUs) are causing series issues in memory reliability. In order to protect data in memory, error det...
A NEW APPROACH FOR EVALUATING THE QUALITY OF DE-BLOCKED IMAGES
JPEG Compression is the most prevalent technique or method for images codecs. But it suffers from blocking artifacts. In this paper a comparison of the perceptual quality of deblocked images based on various quality...