Transient Authentication

Abstract

In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various authentication techniques being used like password, log off system, Biometric techniques. Biometrics suffers from several usability problems. In distributed system, there is problem of hacking of confidential information. Physical security is a major problem for pc. The loss of laptop may lead to the exposure of credit card numbers, passwords, and client data. We propose a model of authentication in which a user uses his Bluetooth-enabled mobile phone, which works as an authentication token that provides the authentication for laptop over a short-range wireless link. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range wireless link. The main aim of this system is to secure the sensitive information of the user on his Laptop.

Authors and Affiliations

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake

Keywords

Related Articles

Preventing Information Lose and Membership Disclosure on Highdimensional Data

The existing methods generalization and bucketization could not give a satisfactory result for privacy preserving on microdata. It results loss of information and some does not prevent the membership disclosure. In t...

Design of Low Power FPGA using Autonomous Power Gating and LEDR Encoding

The most important key challenge in the IC scaling era is to deliver high performance solutions in the process of minimizing power, area and cost. The main objective of this paper is to reduce power consumption by co...

ARM-7 Based Semi Autonomous Vehicle

In every day there are millions of vehicles are passing on the roads due to urbanization. Transportation Department plays an important role in the features like Time, safety and efficiency but due to the lack of awar...

Robust Approach For Query Grouping Using User Search Logs

We proposes user’s are increasingly pursuing complex task orient goals on the Web such as making travel arrangements to managing finances or planning purchases. To better support users in their long term information...

A Survey on Greedy Reconstruction Algorithms in Compressive Sensing

Compressive sensing (CS) is a field of signal processing that provides a framework for image recovery using sub-Nyquist sampling rates. CS has recently gained a lot of attention due to its exploitation of signal sparsit...

Download PDF file
  • EP ID EP27542
  • DOI -
  • Views 349
  • Downloads 6

How To Cite

snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake (2013). Transient Authentication. International Journal of Research in Computer and Communication Technology, 2(2), -. https://www.europub.co.uk/articles/-A-27542