Securing the Data using Advance Authentication Technique
Journal: GRD Journal for Engineering (Vol.1, No. 7)Publication Date: 2016-07-01
Authors : Ajaykumar Donta; Sudhakar Jadhav; Prathamesh Bhawtankar;
Page : 83-87
Keywords : 3D password; Virtual Environment; textual password; Authentication; graphical password;
Abstract
Providing Authentication to any computer means to provide more security to that computer. There are many authentication techniques, such as textual password, graphical password, etc. but each of this individually having some limitations & drawbacks and also these can be hacked or cracked by the various applications. To overcome the drawbacks of existing authentication technique, a new improved authentication technique is proposed called as 3D password. It is multi-password & multi-factor authentication system. It combines a various authentication techniques such as textual password, graphical password etc. In this paper we have introduced our contribution towards 3D Password to make it more secure & more user-friendly to users of all categories. This paper also explains: what is 3D password? Working of 3D password scheme. All these concepts are briefly introduced & explained in this paper section wise.
citation: Ajaykumar Donta, Lokmanya Tilak College of Engineering, KoparKhairne, Navi Mumbai.; Prof. Sudhakar Jadhav ,Lokmanya Tilak College of Engineering, KoparKhairne, Navi Mumbai.; Prathamesh Bhawtankar ,Lokmanya Tilak College of Engineering, KoparKhairne, Navi Mumbai.. "Securing the Data using Advance Authentication Technique." Global Research and Development Journal For Engineering 17 2016: 83 - 87.
Other Latest Articles
- Shear Wall and Frame Interaction Terminology
- Paper On Design and Analysis Of Bending Furnace Using Alternative Fuels
- Review on Assessment Methods of Agriculture Residues
- Mitigation of Volatage Sag and Swell by Ant Colony Optimization using DPFCA Study of Crop Residue Machine for conversion of biomass in to chip form
- Mitigation of Volatage Sag and Swell by Ant Colony Optimization using DPFC
Last modified: 2016-11-11 16:47:18