• No results found

[PDF] Top 20 A Secure Authentication Method by Using Virtual Objects

Has 10000 "A Secure Authentication Method by Using Virtual Objects" found on our website. Below are the top 20 most common "A Secure Authentication Method by Using Virtual Objects".

A Secure Authentication Method by Using Virtual Objects

A Secure Authentication Method by Using Virtual Objects

... task. Using such knowledge yields a high success rate for breaking textual ...Any authentication scheme is affected by the knowledge distribution of the user‟s ... See full document

9

II TEXTUAL PASSWORD

II TEXTUAL PASSWORD

... password authentication scheme is based on a combination of multiple sets of ...3D virtual environment is presented to the user where he navigates and interacts with a multitude of objects which are ... See full document

8

Secure Virtualisation Using Hash Key Authentication

Secure Virtualisation Using Hash Key Authentication

... of secure ranked keyword search over encrypted cloud ...a secure searchable index and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information ...both ... See full document

9

Virtual Reality Based User Authentication System

Virtual Reality Based User Authentication System

... world authentication is the first parameter that is taken into account before creating a system and is also the first shell in providing security to your digitally stored profitable ...Providing ... See full document

5

Secure Authentication Using 2 Level Security

Secure Authentication Using 2 Level Security

... trades using an open machine regardless of the way that the best concern is that a customer's watchword is prone to be stolen in these ...attack, virtual or onscreen consoles with random console game plans ... See full document

6

BIOMETRIC STEGANOGRAPHY USING VISUAL OBJECT FOR REMOTE AUTHENTICATIONVeda D*1, Bhargavi V2 , Harshitha S3 & Navyashree S4

BIOMETRIC STEGANOGRAPHY USING VISUAL OBJECT FOR REMOTE AUTHENTICATIONVeda D*1, Bhargavi V2 , Harshitha S3 & Navyashree S4

... the Authentication is the act of confirming the truth of an attribute of a datum or ...the authentication field are positive and negative ...Positive authentication is well-established and it is ... See full document

9

Survey On Analysis Of Security Threats In DNP3 Protocol

Survey On Analysis Of Security Threats In DNP3 Protocol

... Y. Xu et.al [11] studied and analyzed various communication protocols such as DNP3, Modbus, IEC 60870-5-104, IEC 61850, IEC 61400-25 as well as IEEE C37.118. They have also given attacks possible on these protocols and ... See full document

5

Title: Ubiquitous Virtual Reality: The State-of-the-Art

Title: Ubiquitous Virtual Reality: The State-of-the-Art

... the virtual reality indistinguishable. Eventually, virtual reality and augmented reality (VR/AR) technologies are going to converge and align into a merging hardware which can either be wearable or ... See full document

11

Secure Biometric Authentication System using Chaotic Encryption

Secure Biometric Authentication System using Chaotic Encryption

... secure system to keep the encrypted template to be safer. The RSA (Rivest, Shamir, Adleman) algorithm is an asymmetric data cipher with security advantage but it is slow than any other symmetric cipher. Recently, ... See full document

6

Secure Authentication Payment Method for E – Commerce
Bosubabu Sambana

Secure Authentication Payment Method for E – Commerce Bosubabu Sambana

... against authentication systems that allow users to choose personalized passwords without policy ...rectifying using IP Security, and threat elimination searching algorithms ,fre- quent checking assenting ... See full document

5

Virtual Objects and the Study of Organisations

Virtual Objects and the Study of Organisations

... challenged by a variety of approaches including the political process approach (e.g., Dawson, Clausen and Nielsen, 2000) and social studies of science and technology more generally (Pinch and Bijker, 1984). Drawing on ... See full document

27

Virtual Objects on the Internet of Things

Virtual Objects on the Internet of Things

... Each XML file refers exclusively to a screen that can be displayed during performance of the virtual object. To describe the elements that appear on the screens and how they behave, we have started from a smaller ... See full document

7

Objects, Components and the Virtual Enterprise

Objects, Components and the Virtual Enterprise

... and using it as a basis for re-analyzing the models, it was possible to de- rive a compromise model which reflected the differences and evolution in trust relationships between participating ... See full document

6

Towards An Efficient Graphical Password Authentication System: A Literature Survey

Towards An Efficient Graphical Password Authentication System: A Literature Survey

... user authentication is one of the important topics in information ...try using graphical authentication techniques as their user’s ...password authentication Scheme based on Color Image ... See full document

7

SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

... Blind Authentication as a biometric authentication protocol that does not reveal any information about the biometric samples to the authenticating ...biometric authentication, which she did not ... See full document

8

Secure Message Using Armstrong Number and Authentication Using Colors

Secure Message Using Armstrong Number and Authentication Using Colors

... Colors are used for the authentication purpose. The range of color is 2 0 to 2 24 . RGB model uses 24 bits, 8 bits for each color. To encrypt the data set of three key values are added to the original color ... See full document

5

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

... remote authentication schemes focus on preservation of user anonymity from the ...The authentication schemes used in E-commerce requires anonymity not only to the authentication server but also to ... See full document

5

Mobile Based Secure Authentication using TLS and Offline OTP

Mobile Based Secure Authentication using TLS and Offline OTP

... wants secure Authentication with the server and also to maintain security so they do not lost message ...integrity. Authentication It is the process to confirm the user’s identity (or a machine), ... See full document

5

Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC and HBKS Technique

Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC and HBKS Technique

... message using the intermediate node list. In the proposed method, only the destination node is permitted to initiate route reply message therefore the delay involved in the route discovery process increases ... See full document

6

A Comparative Study on Biometric based Authentication Method for IOT Service

A Comparative Study on Biometric based Authentication Method for IOT Service

... an authentication server by stealing all messages between a device and a ...proposed method uses a newly created random number every time in the authentication step, it can prevent the man in the ... See full document

5

Show all 10000 documents...