European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Authentication

3D Shapes Technique to Improve Mail Services Authentication (Published)

In today’s world, security is important aspect in day to day life .So, everyone used various ways for security purpose. users use passwords for their mail security and Generally, everyone uses textual password. Textual password is combination of alphabets, characters and numbers. users keep textual password as name of their favorite things, actors or actress, dish and meaningful word from dictionary. But the person who is very close to that person can easily guess the password. Graphical password is advanced version of password. Graphical passwords have received considerable attention lately as Potential alternatives to text-based passwords .Graphical password is composed of images, parts of images, or sketches. These passwords are very easy to use and remember. To Drawbacks of previously existing authentication techniques. We present A new improved authentication technique. The proposed system is about a new technique to generate password; there are three password fields each field is about one character and one number, when the user fill the three fields the system security generate a special algorithm which is available in the user’s machine itself to convert the content of the three password’s fields to a 3D graphical shape which are saved and transfer in the form of 3D shape in server side . so all the password have been stored in the form of 3D shape at the server . so anybody want to hack password he will face difficulty to guess the exact password because he can see only the shape not real password ( the three pairs of characters and numbers) .

Keywords: 3D Shape, Authentication, Mail Service, Processing 2.0 mode P3D Technique.

Three – Level Password Authentication (Published)

Authentication is one of the most important security service provided to system by the different authentication schemes or algorithms which must be provided so that only authorized persons can have right to use or handle that system and data related to that information system securely. Techniques used include token based, biometric based as well as knowledge based. Despite these, no single mechanism is efficient and effective to provide adequate security for computing resources such as programs, files, messages, printers, internet, etc. A 3 – level authentication is proposed in this paper that is more confidential for ensuring adequate security.

Keywords: Authentication, Authentication Techniques, Information Systems, Security

3CAuth – A Novel Multi-Factor Authentication Scheme using QR-Code (Review Completed - Accepted)

A multi-factor authentication scheme for remote authentication has been proposed in the paper which provides enough protection on personal credentials of the user. A critical analysis of the scheme shows that it can resist most of the possible attacks and is particularly useful at times of peak loads on servers. The scheme can easily integrate intoany framework offering Internet services to add security guarantee. The same has been brought out by integration with a multi-layered framework designed to handle peak loads on the server ensuring concurrency and availability as well. This integration is seen to clearly enhance the QoS in terms of making right admittance to right resources.

Keywords: 3CAuth, Authentication, Multi-layered Filtering, Multiphase admission control, Peak load, QR-Code, Security, Smart-card

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.