International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-2  ( Feb, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-12  ( Dec, 2023 )
  3. Volume-11,Issue-11  ( Nov, 2023 )
  4. Volume-11,Issue-10  ( Oct, 2023 )
  5. Volume-11,Issue-9  ( Sep, 2023 )
  6. Volume-11,Issue-8  ( Aug, 2023 )
  7. Volume-11,Issue-7  ( Jul, 2023 )
  8. Volume-11,Issue-6  ( Jun, 2023 )
  9. Volume-11,Issue-5  ( May, 2023 )
  10. Volume-11,Issue-4  ( Apr, 2023 )

Statistics report
Jun. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 134
Paper Published : 1567
No. of Authors : 4088
  Journal Paper


Paper Title :
AN IMAGE BASED APPROACH FOR AUTHENTICATION USING MULTI-LEVEL SECURITY SYSTEM

Author :M.KIRAN, E. PURUSHOTHAM, B. DILLI KUMAR

Article Citation :M.KIRAN ,E. PURUSHOTHAM ,B. DILLI KUMAR , (2013 ) " AN IMAGE BASED APPROACH FOR AUTHENTICATION USING MULTI-LEVEL SECURITY SYSTEM " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 33-36, Volume-1,Issue-7

Abstract : -Security-sensitive environments defend their resources against unauthorized access by implementing access management mechanisms. Text based passwords are not secure enough for such applications. Increasing security has regularly been a problem since net and net Development came into existence, text primarily based passwords is not enough to counter such problems, that's to boot Associate in Nursing anachronous approach presently. Therefore, this demands the necessity for one issue safer on aspect being further userfriendly. Therefore, we have tried to increase the protection by involving a 3-level security approach, involving text based totally parole at Level one, Image based totally Authentication at Level a try of, and automatic generated one-time secret (received through an automatic email to the authentic user) at Level 3. And Associate in Nursing diligent effort has been in serious bother thwarting Shoulder attack,Tempest attack, and Brute- force attack at shopper facet , through the utilization of distinctive image set inside the IBA System

Type : Research paper

Published : Volume-1,Issue-7


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-430   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 34
| Published on 2014-01-27
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY