Transient Authentication

Abstract

In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.

Authors and Affiliations

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake

Keywords

Related Articles

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...

The Effect of NCT Techniques on SC-FDMA System in presence of HPA

In this paper, a companding technique is used to reduce the Peak-to-Average Power Ratio (PAPR) in Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems. By Nonlinear Companding Transform (NCT) technique...

Survey on Different Data Hiding Techniques

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...

Implementation Of Radix-10 Matrix Code Using High Speed Adder For Error Correction

Memories are most widely used component in electronic systems. As CMOS technology scales down, multiple cell upsets (MCUs) are causing series issues in memory reliability. In order to protect data in memory, error det...

A NEW APPROACH FOR EVALUATING THE QUALITY OF DE-BLOCKED IMAGES

JPEG Compression is the most prevalent technique or method for images codecs. But it suffers from blocking artifacts. In this paper a comparison of the perceptual quality of deblocked images based on various quality...

Download PDF file
  • EP ID EP27542
  • DOI -
  • Views 329
  • Downloads 6

How To Cite

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake (2013). Transient Authentication. International Journal of Research in Computer and Communication Technology, 2(2), -. https://europub.co.uk./articles/-A-27542