• No results found

[PDF] Top 20 A Survey on Various Security Techniques Used For Authentication

Has 10000 "A Survey on Various Security Techniques Used For Authentication" found on our website. Below are the top 20 most common "A Survey on Various Security Techniques Used For Authentication".

A Survey on Various Security Techniques Used For Authentication

A Survey on Various Security Techniques Used For Authentication

... Security analysis of online signature verification system as compared to that of 4-digits PIN, and two usability metrics is also presented. Further investigation includes the use of other biometric key binding ... See full document

5

A Survey on Different Graphical Password Authentication Techniques

A Survey on Different Graphical Password Authentication Techniques

... user authentication is an important topic in the field of information ...enforce security of information, passwords were ...popular authentication method used from ancient ...to various ... See full document

9

A SURVEY ON VARIOUS AUTHENTICATION TECHNIQUES AND GRAPHICAL PASSWORDS

A SURVEY ON VARIOUS AUTHENTICATION TECHNIQUES AND GRAPHICAL PASSWORDS

... decades various applications have been developed in various fields, where authentication is the main process of granting access to the particular ...application. Authentication is the process, ... See full document

7

Survey Of Graphical Password Authentication Techniques

Survey Of Graphical Password Authentication Techniques

... user authentication is an important topic in the field of information ...enforce security of information, passwords were ...popular authentication method used from ancient ...to various ... See full document

8

A Survey of Security Threats and Authentication Schemes in WiMAX

A Survey of Security Threats and Authentication Schemes in WiMAX

... Various security vulnerabilities found in WiMAX network were studied by Trung Nguyen ...PKM authentication and registration ...is used in the initial ranging ... See full document

5

Title: A Survey on Different Techniques for Message Security and Authentication in Offline Chatting

Title: A Survey on Different Techniques for Message Security and Authentication in Offline Chatting

... Recently, as the number of smart phones grows, various membership-based applications are developing. Many of these such as charged video streaming, online game and wireless access applications rely on paid ... See full document

7

A Survey on Authentication Techniques

A Survey on Authentication Techniques

... A. Face recognition: One approach to face recognition using visible light uses a neural network as the basis of its face recognition algorithm (Phillips, 1997). Another method, based on a statistical analysis of facial ... See full document

5

A SURVEY ON VARIOUS ATTACKS POSSIBLE IN AUTHENTICATION

A SURVEY ON VARIOUS ATTACKS POSSIBLE IN AUTHENTICATION

... commonly used for implementing brute force ...is used by an attacker may be blocked. Tarpitting is another techniques used for reducing the speed of an ... See full document

5

A Survey of Multicast Authentication with Different Signature Techniques

A Survey of Multicast Authentication with Different Signature Techniques

... three security services namely Non-repudiation (don’t transmit data in unauthentic case), Data integrity (received data is correct) and Data origin authentication (data from valid sender) can be maintained ... See full document

5

A Survey on Various Security Techniques to Secure Cloud Data

A Survey on Various Security Techniques to Secure Cloud Data

... i) Token correctness: It achieves assurance for data storage correctness and data error localization, using pre- computed token.Before sharing file distribution using pre-computes a certain number of shortest ... See full document

8

Survey of Cloud Security Techniques

Survey of Cloud Security Techniques

... Data store in cloud are compressed or some time lost. To secure them before losing its originality, data needs to be encrypted before storing them into the cloud. Some time data are lost by cloud provider itself to avoid ... See full document

6

A Survey on Various Techniques used to Add Watermark to Multimedia Data for Digital Copyrights Protection

A Survey on Various Techniques used to Add Watermark to Multimedia Data for Digital Copyrights Protection

... hiding, used to hide secret information inside the original image also called as cover ...person. Security means even if embedded watermark is detected by intruder it should not be decodable without knowing ... See full document

6

Improve Security for Fake clicks authentication by Unsupervised Captcha

Improve Security for Fake clicks authentication by Unsupervised Captcha

... In general, there is extensive literature on captcha and graphical system to avoid machine learning attacks. This section reviews about the some related work in order to explore the strengths and weakness of existing ... See full document

6

A Survey on Enhancement of Text Security Using  Steganography and Cryptographic Techniques

A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques

... Several techniques have been proposed by researchers for securing electronic communication. In the research work of [9], the researchers proposed cryptography and steganography for securing data transfer using ... See full document

5

Securing Data in Cloud using Graphical Password Authentication and AES Cryptography

Securing Data in Cloud using Graphical Password Authentication and AES Cryptography

... is used to protect the important ...protection various techniques are ...normally used techniques that operate information in order to cipher or hide their ...password ... See full document

5

Advanced Microcontroller Based Bio-Metric Authentication Voting Machine

Advanced Microcontroller Based Bio-Metric Authentication Voting Machine

... widely used in various applications such as criminal identification, prison security electronic banking, ecommerce ....Biometric authentication requires comparing a registered or enrolled ... See full document

12

A Stable and Secure One Time Password Generation Mechanism using Fingerprint Features

A Stable and Secure One Time Password Generation Mechanism using Fingerprint Features

... multifactor authentication to counter various types of attacks against authentication and authorization of internet ...are used in certain OTP generation schemes which are no longer considered ... See full document

8

Network Security Analysis Based on Authentication Techniques

Network Security Analysis Based on Authentication Techniques

... above techniques need to be used as shown in Table ...multi-factor authentication. For network security, each authenticator result must be ...factor‟s authentication results, so all ... See full document

8

Various Techniques of DDoS Attacks Detection & Prevention at Cloud: A Survey

Various Techniques of DDoS Attacks Detection & Prevention at Cloud: A Survey

... analyses various approaches of DDoS attacks and their handling ...network security managers. The testbed enables operators to emulate various network topologies, services, and to analyze attacks ... See full document

11

Facial Expression Recognition Using 2D Images: a Survey

Facial Expression Recognition Using 2D Images: a Survey

... the techniques used for facial expression ...the various publicly available facial expressions ...the various articles referenced in building this ... See full document

6

Show all 10000 documents...